Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

A CISO's grimoire for outsmarting attackers

For security leaders, staying vigilant and prepared is like wielding a well-crafted spellbook. OWASP, MITRE ATT&CK, and threat research are the critical chapters in this spellbook that leaders need to leverage to anticipate and counter emerging threats effectively, because you can’t afford for your organization to be ensnared by threats that could have been foreseen.

Security training - How to ensure your training is effective

The best way to solve this issue is to provide training that is interesting, interactive, and engaging. A great example would be the Defense.com videos offered. They provide a fun, informative and. with the inclusion of exams, interactive way to train staff on cyber security. Even just informal quiz sheets could help staff retain the information and put it into practice when the situation arises.

Privacy and Safety Guide for Users of X: Addressing Stalking Concerns

The recent updates to the blocking feature on X (formerly Twitter) have sparked significant concerns about user safety and privacy, particularly regarding stalking. These changes now permit blocked users to view posts but prevent them from engaging, such as liking, commenting, or sharing.

The Rise of Network Observability: A Strategic Technology Enabler

The current era of distributed work requires delivery of truly borderless digital applications and services powered by the cloud, delivered via a secure network centered on high performance and best in class user experience. It is essential that your organization has visibility and real-time insights into the data flow across the extended enterprise network as well as the ability to apply the necessary People, Process & Technology safeguards for data in transit and rest.

AI Tokenization: Understanding Its Importance and Applications

In artificial intelligence (AI), especially within natural language processing (NLP), tokenization is a fundamental process that breaks down text into smaller, manageable units known as tokens. Depending on the specific task and model, these tokens can be individual words, subwords, characters, or even symbols.

The Benefits of One Identity Active Roles - Based on PeerSpot Real User Feedback

One Identity’s suite of IAM solutions includes Active Roles, an AD (Active Directory) management tool designed to increase the security and efficiency of identity environments by consolidating all AD domains and Entra ID tenants onto a single console This ensures consistent enforcement of security policies through automation, enables identity data to be synchronized across the entire network, and reduces the number of accounts which have been erroneously granted access privileges.

Revolutionizing TLS Inspection: How Cato Networks Is Transforming Encrypted Traffic Security

In today’s digital environment, encrypted traffic has become the norm, with over 90% of web communications now utilizing encryption. While this secures data in transit, it has become a blind spot for enterprises, enabling attackers to hide malware within encrypted channels. According to the Q3 2024 Cato CTRL SASE Threat Report, organizations that enable TLS inspection block 52% more malicious traffic than organizations than don’t.

Securing Identities in Business Data Flows

In today’s business ecosystem, data exchanges are critical for operations. From APIs to FTP connections, Electronic Data Interchange (EDI), and Virtual Desktop Infrastructure (VDI), data transfers happen continually, each using specific protocols and requiring authentication to ensure security and confidentiality. These interactions rely on a vast array of identities, keys, and credentials that need consistent management and periodic rotation to maintain security.