Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

What Is IP Attribution, and Why Is It Doomed?

Internet Protocol (IP) attribution is the attempt to identify a device ID or individual responsible for a cyber attack (e.g. ransomware or other types of malware) based on the origin of a network packet. An IP address is given to a system for a period of time that enables them to exchange data to and from other devices on networks.

Is the Electric Grid Ready to Respond to Increased Cyber Threats?

Reports from the U.S. Government Accountability Office (GAO) and Siemens highlight both the increasing cyber threats faced by the electric utility companies and the lack of adequate readiness to respond to these threats. According to these reports, a cyber-attack on the electric grid could cause “severe” damage.

Ransomware Attack Takes Down German Automation Giant

One of the leading producers of automation tools is still experiencing outages after being hit by a ransomware attack over a week ago. German giant Pilz notified the prosecutor's office and the Federal Office for Security in Information Technology after experiencing a coordinated cyberattack on Sunday, October 13. The company has set up an incident response team to identify the source of the attack and mitigate the issue but has warned that these outages will persist for several more days.

Guide to Container Security - Everything You Need to Know

Ah, the wonders of technology. In the innovation-rich Information Age, we are the beneficiaries of a nonstop wave of new advancements, each offering the ability to execute vital tasks faster and more efficiently than ever before. However, along with each breakthrough comes potential security vulnerabilities.

Cyber Attack Risk Climbs in Latest WEF Regional Risk Report

Unsurprisingly, cyber attacks are growing in the business sector and not just in the United States but world-wide. Cyber-attacks represent the greatest risk in six out of ten of the top economies in the world. The report presented by the World Economic Forum discusses formjacking, cryptojacking, ransomware like LockerGoga and other cyber-attacks of which CEOs around the globe are starting to become more aware.

Collaboration in the modern biotech era

The life sciences industry has rapidly changed over the past twenty years. Drug development, historically, used to rely on vertically-integrated institutions that spanned scientific functions. However, today, products are launched by emerging startups, vast companies and any size in between. To improve velocity and agility, research is increasingly outsourced to academia and external partnerships beyond the traditional confines of a company.

Reviewing best practices for IT asset management in the cloud

It used to be that businesses needing their own large computer networks had to do everything themselves. They had to buy all of their servers, all of their networking appliances. They needed the physical space on premises for all of their datacenters, the HVAC people to keep everything cool, and the massive electricity bills to keep all of that going.

Getting Visibility Across Your Cloud Environments

Are you an engineer or a manager working on a cloud application running in production? Do you have to type ssh or kubectl frequently to get things done? Does auditing, compliance, or access control sound mildly painful? This blog post is for you! In a world full of hackers, data breaches, and data privacy legislation, getting visibility into who is accessing your infrastructure (i.e., cloud or dedicated production environments where applications are hosted) and what they’re doing is vital.

Managing and Responding to Advanced Cyber Risks in the Oil and Gas Industry

To protect the integrity and safety of their business-critical assets, cybersecurity must be a top priority for the oil and gas industry. Although they operate some of the nation’s most critical systems, securing these complex infrastructures can be a huge challenge.