Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

XDR: A New Vision for InfoSec's Ongoing Problems

Let’s face it. The information security industry loves a new acronym. For industry long-timers, a new acronym might be just the latest reason for an eye roll. For folks new to the field, it can be very confusing. A constructive way to look at XDR — extended detection and response — is as an opportunity to take a fresh look at some old problems and gain clarity.

Amazon EC2 Just-in-time Access With Teleport and Slack

This blog is part three in a series about identity-based access and management of AWS resources. In Part I, we covered how to use OSS Teleport to access Amazon EC2 instances running in private subnets. Part II explained implementing identity-based access via SSO integration with Okta. In Part III, we will guide you through the steps to configure privilege escalation for just-in-time access requests.

How to Foster a Productive SOC Culture

According to the 2021 Devo SOC Performance ReportTM — which is based on the results of a survey of more than 1,000 security practitioners — having an understaffed SOC or constant turnover of security talent can cripple an organization’s security posture. Let’s look at some of the root causes that can lead to these two interconnected problems.

Challenges and solutions for securing distributed, remote and hybrid workforces

The world has changed. The COVID-19 pandemic has dramatically increased the number of teams that are working with a remote and distributed model. This change is a welcome acceleration of what many feel would have been the eventual outcome of our digital future. With this new model comes a new and changing set of security challenges.

Automatically Add IP Addresses to a Penalty Box in Cloudflare with Torq

Good security may come from strong defenses, but strong security comes from a good offense. This is especially true for network security, where minutes can make the difference between a breach and a near miss. For example, if an unknown IP address triggers an alert for suspicious or abusive behavior, the faster you can isolate and block that address, the less likely it is that the person or entity at the other end can do damage.

Enterprises Use NQE's Dynamic Inventory To Better Track and Understand Network Devices

When Heraclitus wrote in the 6th Century that the only constant is change, he had no way of knowing just how apt his words would prove for contemporary enterprises. Consider, for instance, the effect that the Great Resignation has had on enterprises. In 2021 alone, almost 4 million workers quit their jobs per month – the highest yearly average record of all time for employee turnover.

Netacea Receives Top Score in Bot Detection Criterion in 2022 Analyst Report

Agentless bot management provider ranked among top players in Analyst Report Manchester, 12th April, 2022 – Netacea, the bot detection and mitigation specialist, today announced it has received the highest score in the Bot Detection criterion in The Forrester Wave™: Bot Management, Q2 2022 report.

The Imperative of Managing Cyber Risk in Business Context

People have long used mission statements, declarations and manifestos to publicly convey the intentions, motives or views of its issuer. While the historical political landscape has long used these actions to challenge and provoke, they are also advertisements to gain attention and to spark action.

How to Foster a Productive SOC Culture

According to the 2021 Devo SOC Performance ReportTM — which is based on the results of a survey of more than 1,000 security practitioners — having an understaffed SOC or constant turnover of security talent can cripple an organization’s security posture. Let’s look at some of the root causes that can lead to these two interconnected problems.