Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Aikido Security raises Euro5m to offer a seamless security solution to growing SaaS businesses

Aikido Security, the developer-first software security app for growing SaaS companies, today announces it has raised €5m in a Seed round co-led by Notion Capital and Connect Ventures; with investment from Inovia Capital Precede Fund I, led by partners Raif Jacobs and former Google CFO Patrick Pichette; as well as an impressive roster of angel investors including Christina Cacioppo, CEO of Vanta.

Less than half of UK businesses have strong visibility into security risks facing their organisation

Vanta State of Trust report reveals only 9% of the average UK company's IT budget is dedicated to security despite rising risk of cyber attacks. 78% of UK leaders already using AI/ML in some capacity to detect security risks but nearly 6 in 10 say regulation would increase investment.

Insider Risk Management for Your Cloud Infrastructure: Why Do You Need an IRM Program?

Organizations use more and more cloud services these days to improve business efficiency and achieve working flexibility for remote employees. However, keeping up with reliable cybersecurity measures in such a cloud-dependent world becomes challenging. And one of the reasons for that is the increase in insider risk. In this article, we explore the major insider risks in cloud infrastructure and discuss the importance of IRM program for cloud security.

Detecting account compromise with UEBA detection packages

The Elastic InfoSec Threat Detection team is responsible for building, tuning, and maintaining the security detections used to protect all Elastic® systems. Internally, we call ourselves Customer Zero and we strive to always use the newest versions of our products. This blog details how we are building packages of detection rules that work together to create a high fidelity alert for strange user behavior.

Weather Forecast: Money Is Going to Rain from the Cloud

Since the start of Bitcoin in 2009, the popularity and prevalence of cryptocurrencies has exploded, resulting in a net worth of over $1 trillion that continues to grow. Cryptocurrency—held in virtual wallets—is obtained by users who purchase coins on a cryptocurrency exchange, receive coins as payment from someone else, or “mine” coins virtually themselves.

DDoS attacks have increased by 40% over the last six months

Distributed denial-of-service (DDoS) attacks have been around for a long time. However, the sophistication and scale of these threats has grown in recent years. Cybercriminals are employing amplification techniques that exploit vulnerabilities in misconfigured services or network protocols to increase the traffic they can generate and maximize the impact of their attacks.

Announcing Ruby - your new Generative AI companion for Data Security

Say hello to Ruby, your new Generative AI companion for the Rubrik Security Cloud. Ruby is designed to simplify and automate cyber detection and recovery, something that IT and Security teams struggle with as cyber incidents are getting wildly frequent and the attacks are evolving quickly. A study by Rubrik Zero Labs revealed that 99% of IT and Security leaders were made aware of at least one incident, on average of once per week, in 2022.

Strengthening Cyber Defenses with Multi-Factor Authentication

The need for robust cyber defenses has never been more prevalent. We live in a world where remote access to data is the norm, opening up additional vulnerabilities when protecting digital assets. Additionally, organizations need to comply with data privacy requirements including understanding Digital Personal Data Protection. Mutli-Factor Authentication (MFA) isn’t a new concept. However, despite this, there is still confusion surrounding the mechanism and how it adds to cyber defense.