Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

The Importance of Email Archiving

One of the primary reasons for email archiving is legal compliance. Many industries and organizations are subject to various regulations and laws that require them to retain certain types of electronic communication, including emails. Failing to comply with these regulations can result in severe penalties, fines, and legal consequences. By implementing email archiving, you ensure that your organization is well-prepared to meet these requirements. Litigation Support.

10 Methods for Identifying and Protecting Privileged AD Users

Compromising privileged accounts is the penultimate objective of most cyberattacks — once attackers gain privileged access, they can then accomplish their final goal, whether that’s to steal or encrypt information assets or disrupt business operations. Typically, cybercriminals gain a foothold in a network by compromising of a low-level account on a local machine.

SEC Regulations: What is a "Material" Cybersecurity Incident?

In one of the most important cybersecurity regulatory developments in recent memory, the U.S. Securities and Exchange Commission (SEC) recently adopted new cybersecurity disclosure requirements for publicly traded companies, including a requirement to publicly disclose a “material” cybersecurity incident in Form 8-K within four business days of determining that it is material.

Microsoft 365 GCC High Guide for DoD Contractors

In today’s rapidly evolving cyber threat landscape, organizations, particularly those within the public sector and defense industries, face unprecedented challenges in securing sensitive data and ensuring regulatory compliance. The need for a comprehensive, cloud-based productivity and collaboration suite that empowers teams and meets stringent security and compliance requirements has never been greater.

Unlocking the Power of Cybersecurity Automation: Insights from ThreatQuotient's 2023 Research

Defined by relentless cyber threats and evolving challenges, the role of cybersecurity has never been more crucial. As organizations across the globe struggle with the ever-expanding threat landscape, the adoption of cybersecurity automation has emerged as a promising solution. This third annual survey conducted by ThreatQuotient, explores cybersecurity automation adoption and provides insights gathered from 750 senior cybersecurity professionals from the UK, US, and Australia.

Announcing IaC+ early access: Secure your infrastructure configurations across the SDLC

Designing and maintaining secure infrastructure configurations from code to cloud is a complex process involving multiple technical teams and security stakeholders. The first challenge is writing secure infrastructure configurations pre-deployment.

Does AI lead to AppSec hell or nirvana?

The use of artificial intelligence in every area of life — from writing papers to maintaining critical infrastructure to manufacturing goods — is a controversial topic. Some are excited about the possibilities that come with AI/ML tech, while others are fearful and reticent. These differing opinions raise a fundamental question: will AI turn our modern-day society into a utopia or a dystopia?

Today's Top Cybersecurity Threats & the Impacts to Your Business

With the escalating frequency and complexity of cyberattacks, businesses are constantly under threat. Security operations have become an indispensable aspect of organizational survival and success. Cyberattacks and data breaches regularly make headlines as malicious actors continue to adapt and develop new tactics.

Announcing General Availability for the Magic WAN Connector: the easiest way to jumpstart SASE transformation for your network

Today, we’re announcing the general availability of the Magic WAN Connector, a key component of our SASE platform, Cloudflare One. Magic WAN Connector is the glue between your existing network hardware and Cloudflare’s network — it provides a super simplified software solution that comes pre-installed on Cloudflare-certified hardware, and is entirely managed from the Cloudflare One dashboard.

Strengthening Cybersecurity for small and medium-sized businesses: The importance of Security Orchestration, Automation, and Response (SOAR)

In today's increasingly complex threat landscape, small and medium-sized businesses (SMBs) face significant challenges in protecting their assets and reputation from cyber threats. We will explore the benefits of SOAR, its role in enhancing security operations, and its ability to mitigate risks, streamline incident response, and protect valuable business assets.