Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

The Most Common Types of Cyberattacks

The most common types of cyberattacks are phishing, variations of password attacks, malware, spoofing, supply chain attacks, DDoS attacks, identity-based attacks, IoT attacks and insider threats. Continue reading to learn more about what these cyberattacks are and how to keep yourself protected from them.

MPC Security: 5 questions to ask your wallet provider

In the world of digital assets and blockchain-driven solutions, security is the utmost priority for organizations across the globe. While numerous multi-party computation (MPC) providers vow to offer best-in-class security and service, what truly sets them apart is the underlying cryptographic proofs and infrastructure. Given the consequences a security breach can lead to, it is crucial to make informed decisions when evaluating an MPC wallet provider.

Automate incident response and security workflows with Blink in the Datadog Marketplace

Security and DevOps engineers often spend a lot of time and effort creating and managing complex, repetitive workflows, such as incident response, honeypotting, recovery and remediation, and more. Blink is a no-code security platform that enables users to create workflow automations, triggers, and self-service apps to streamline processes, better enforce guardrails, and eliminate operational bottlenecks.

Protecting SAP CUI Exports with HALOCORE

Business-critical applications such as ERP, SCM, CRM, PLM, and others support essential business functions and processes for the world’s largest commercial and government organizations. This includes supply chain, manufacturing, finance, sales and services, and defense. Many businesses in the Defense Industrial Base (DIB) utilize SAP in their ERP landscape.

Unifying Security and Observability to Strengthen Digital Resilience

In today's always-on, ever-connected world, keeping digital systems secure and reliable is not just a goal, but a business imperative — it is now a boardroom-level conversation. With the increasing complexity of digital systems and ever-growing event volume, organizations face a constant battle to protect their systems, data, and reputation from a myriad of threats. Simultaneously, they need to optimize system performance, identify bottlenecks, and enhance the overall user experience.

10 rules for security leadership

I have worked as a security leader since the early commercial days of the internet, where the CISO role only existed in some areas of financial services. Participating in the growth and maturity of security as a business function has been an amazing journey. I have learned a lot of lessons on my own, through my personal experiences, or via my peers. One thing I was not able to do was learn from experienced CISOs that have time and distance to reflect on how to best be successful as a CISO.

Introducing Egnyte's New AEC Add-Ons: Special File Handler and Project Controls

Architecture, Engineering, and Construction (AEC) firms face challenges in design and construction due to complex workflows. Without specialized tools, collaboration can become slow and workflows become complicated, leading to delays and communication gaps -impacting productivity and project timelines for firms of all sizes.

Millions Potentially Impacted by Blue Cross of Illinois Breach

Blue Bross and Blue Shield of Illinois is the largest insurance company in Illinois, serving over 8.9 million individuals. The company handles a huge amount of medical information and is responsible for ensuring that millions of people have the medical and dental insurance they need. The company recently discovered it was indirectly the victim of a data breach and that some of its customers were at risk. Learn more about the breach below.

What to expect when you're expecting a cybersecurity audit for compliance

What to expect when you’re expecting a cybersecurity audit for compliance A cybersecurity audit is a structured evaluation or assessment conducted to determine an organization's level of compliance with relevant cybersecurity regulations, industry standards and internal policies. Read on to learn what an audit is looking for, the challenges of an audit, how to prepare for one, and the tools that can help your organization get ready.