Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Tripwire Industrial Edge - The New Method of Visibility for Industrial Networks

When was the last time you thought about all of the devices running on your network? Think of your home network and how deceptively simple it appears. A full inventory of that network would probably surprise you, as it would show all of the devices that you may have forgotten about as well as a few of the neighbor’s devices that are piggy-backing off of your Wi-Fi. This visibility is often shocking to many people.

6 Ways Biotechs Can Use AI, Automation to Maximize Data at Scale

For years, biotechs have been hampered by the administrative burden of seemingly endless amounts of diverse, siloed data, slow data ingestion, and security threats coming from internal and external sources. And yet, the life sciences industry continues to see double-digit growth. It’s now worth $285 billion a year, with no signs of slowing down.

Bearer and Trace announce industry partnership

Bearer has partnered with Trace to help companies leverage the best of services and software and build a connected compliance program. Bearer is innovating data risk assessments to build intelligence and stack visibility at scale, while the Trace team brings decades of client-led professional services experience in privacy and data security. Together, the two companies bring the best blend of human and tech capabilities to shape the future of compliance.

ARMOBest Framework - what it is and why you need it?

There were several security assessments and compliance frameworks in Kubescape before we released ARMOBest – NSA-CISA and MITRE. Naturally, people ask, why another one? Especially, if it’s not coming from a well-known source that some people may be required to comply with. Some frameworks, like MITRE, are designed bottom-up, mainly focusing on the infrastructure. Others, like NSA-CISA, are designed top-down, paying more attention to the application side.

Listen To Those Pipes: Part 1

If you haven’t already read the episode on process hunting, I recommend that you go back and do so, at least for a couple of my jokes, and to help keep our clicks/metrics up. Where that episode concentrated on tracking processes, this blog will concentrate on, you guessed it, pipes. And due to the depth I tried to go with this one, it has been split into a two-part series, so make sure to come back for the second part after you’ve finished this one.

What are Zero day Attacks? - A Comprehensive Guide

Cyber threats and attacks are a growing issue for businesses because the amount of vulnerabilities has increased. The volume of global malware has risen 58% annually, and the volume of spam has risen by more than one-third in the past 12 months. These issues have made it more difficult for employees to focus on what they need to do. Zero-day attacks in cyber security are one such challenge for security teams around the world.

Emotet is Back in the Game

Known to be one of the most useful popular and dangerous threats, Emotet, firstly seen in 2014, is a Malware-as-a-Service (MaaS), that used to operate as a banking trojan targeting banks in Germany, Austria and Switzerland. Since 2017, Emotet has done a shift into a loader and took parts in campaigns, setting up for Trickbot delivery, deployment of ransomware such as Conti and Ryuk, and other malwares such as QuakBot, Azorult, SilentNight and more.

The New "Attack Surface" - Securing the Business Beyond Conventional Boundaries

In 2020, just under half the UK workforce worked from home at least some of the time, according to the Office of National Statistics. In the United States, a survey by Upwork found that over a quarter of professionals expect to work fully remotely within the next five years. Working from home has been propelled into the mainstream by the COVID-19 pandemic as well as the resulting lockdowns and restrictions on traveling to work.