Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

CrowdStrike Falcon Detects 100% of Attacks in New SE Labs EDR Test, Winning Highest Rating

CrowdStrike Falcon received a new AAA award from independent testing organization SE Labs, achieving a 100% Attacks Detected rating in the latest SE Labs Advanced Security Test, part of the endpoint detection and response (EDR) testing category. These test results speak to CrowdStrike’s commitment to transparency and Falcon’s comprehensive insight into detecting relevant elements of attack throughout sophisticated adversary attack chains.

Cybersecurity in the Year Ahead: Trustwave 2022 Cybersecurity Predictions - APAC Edition

This is part 3 of Trustwave’s 2022 Cybersecurity Predictions blog series brought to you by our APAC team. In 2021, the cybersecurity industry was truly tested. Most notably, we uncovered the deeper fallout from the SolarWinds attacks, combatted the proliferation of advanced ransomware gangs and a surge in vulnerability exploitation, and saw fragile supply chain and critical infrastructure more targeted by attackers than ever.

Netskope Named One of the 25 Highest Rated Private Cloud-Computing Companies to Work For

Here at Netskope, our corporate culture means everything to us. In our core values, we strive to be collaborative and transparent, to cut out politics and bureaucracy, and to always have fun. With all of these values in mind, we are so excited to announce that Netskope has been named one of Battery Venture’s 25 Highest Rated Private Cloud-Computing Companies to Work For!

Teleport 8 - Introducing Desktop Access

If your organization runs cloud-native workloads on a mixed infrastructure of Linux and Windows, this announcement of Teleport 8 is for you! TL;DR Teleport 8 enables easy and secure remote access to a mixed fleet of Linux/SSH and Windows/RDP hosts via a single TCP/IP port. Before we dive deeper into how it works, let’s introduce Teleport to new readers of this blog.

Simplifying detection of Log4Shell

Security workers across the world have been busy since last Friday dealing with CVE-2021-44228, the log4j 0-day known as Log4Shell, that is already being heavily exploited across the Internet. Given the huge number of systems that embed the vulnerable library, the myriad ways that attackers can exploit the vulnerability, and the fact that automated exploitation has already begun, defenders should expect to be dealing with it for the foreseeable future.

Mitigating Industrial Production Risk with Tripwire

It seems that the most popular topics in cybersecurity for the last year has been zero trust as well as the convergence of Information Technology (IT) and Operational Technology (OT). These developments are good, as they signal some positive motion towards better overall security. Some of the current risks are worth noting, with a forward glance to protecting specific industries such as oil and gas production plants.

How to approach holistic data management

Start-ups committed to becoming something special begin building their new business as they mean to go on, particularly in the potentially business velocity-killing areas of security and compliance. For start-ups in highly regulated industries like healthcare and finance, the requirement to have the right technical and organizational controls in place is nothing less than existential.

2021 Devo SOC Performance Report: SOC Leaders and Staff Are Not Aligned

The third annual Devo SOC Performance ReportTM shows that working in a security operations center continues to be painful. Based on an independent survey of more than 1,000 global cybersecurity professionals commissioned by Devo and conducted in September 2021, the report examines current SOC trends and challenges.

Cybersecurity Sessions #2: Drone Safety and Cybersecurity

With drones now capable of massive cluster displays at events like the Olympics opening ceremony, and being used in sectors like healthcare, what role does cybersecurity play in making these devices safe? In this month’s episode of the Cybersecurity Sessions podcast, Andy talks to drone pilot and experienced cybersecurity expert Frank Jones about the emerging technology of drones, their growing list of use cases and how important security is in their wider adoption.

How to cyber security: Software supply chain risk management

Effective software supply chain risk management requires security measures throughout the entire supply chain. Risk management is a well-understood part of business. Personified, risk management would be a dusty, gray man with a gray beard who asks questions that make you uncomfortable. Risk management is about understanding threats to your business and figuring out how you will deal with them.