Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

What we learned at KubeCon + CloudNativeCon Europe 2022: From presentations to accolades

It was a busy week last week at KubeCon +CloudNativeCon Europe 2022 in Valencia, Spain. It seemed like the entire world related to Kubernetes came together after two years of being apart. It was fulfilling meeting up with our peers and gaining market insight- face-to-face. Catalogic’s core messaging this year has revolved around cyber-resilience for data protection.

Webinar: "I get paid to hack your company and these are the controls I hate most!"

Drawing on over three decades’ experience in penetration testing for global organisations of all sizes, this webinar outlines some of the most common attack methods in use today and shares effective approaches for tackling them. The session on will detail the most effective security controls to prevent and mitigate common types of cyber-attacks.

A Problem Like API Security: How Attackers Hack Authentication

There is a sight gag that has been used in a number of movies and TV comedies that involves an apartment building lobby. It shows how people who don’t live there, but who want to get in anyway, such as Girl Guides looking to sell cookies to the tenants – simply run their fingers down every call button on the tenant directory, like a pianist performing a glissando, knowing that at least one of the dozens of apartments being buzzed will let them in simply out of reflex or laziness.

Secure your Software Supply Chain with Xray and Lightstep Incident Response

Securing your software supply chain requires proactively identifying compliance issues and security vulnerabilities early in your software development lifecycle. Additionally early detection must be coupled with an organized and agile method of response that brings together developers, operations and SRE teams to accelerate remediation workflows across the organization.

BIG things are Happening at Graylog!

Did you hear the news? Graylog is on a mission to help make your IT environment and data more efficient and secure by making it super easy to uncover the answers stored in your machine data. At Graylog, coming up with solutions to problems faced by IT and Security professionals is what drives us. Our teams are always working on ways to add meaningful functionality that increases productivity so you can focus your resources on the innovation and core competencies that you’re known for.

How to Use Cyber Assurance Programs to Manage Risk Based on Business Outcomes

If you’ve been following any of our recent webinars or in-person presentations, you’ve heard us talk a lot about shifting the mindset from a focus on compliance to a risk-first approach. We’ve discussed that the best way to do this is to align your risk management program to specific outcomes, where compliance becomes a subset of your risk management program. But what does that mean specifically? And what are some examples of how this can be done?

Digicel Deploys Enea AdaptiveMobile Security to Protect Mobile Networks in 26 Caribbean and Central American Markets

Enea the world leader in mobile network security, today announced that Digicel Group has deployed Enea AdaptiveMobile Security's comprehensive signaling security solution to protect mobile networks and subscribers in 26 markets across the Caribbean and Central American region.
Featured Post

How Tech Innovation is Revolutionising Cybersecurity for Law Firms

It is often said that the human factor is the most important part of cybersecurity. In many ways this is true. Cybersecurity tech plays a vital role in everything from blocking dangerous traffic and spotting suspicious activity on an account, to offering the kind of 24/7 surveillance that simply isn't practical (or possible) for humans to carry out themselves. But ultimately, this is only a part of cybersecurity.

Performance improvements, snappier ports, and spring cleaning

The vulnerabilities page allows you to see all findings across your attack surface. This includes simple filters that let you specify what you want to focus on, including the level of severity, which domains you want to look at, and whether it was found in the past week or the past month.