Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Xalient named one of the FEBE Growth 100 fastest growing founder-led private companies

Secure network transformation specialist, Xalient proudly announced today that it is part of the FEBE Growth 100 list for the second consecutive year. FEBE champion’s the fastest-growing, founder-led private companies headquartered in the UK. The Growth 100 highlights founders that are driving their companies to deliver significant sales, revenue and profit, against a backdrop of unprecedented economic challenges.

The Power of Generative AI and Lessons Learned from Zenith Live 2023

It was great to be both a sponsor and a participant at Zenith Live in Las Vegas last week. Attended by security architects, CIOs and CTOs, the caliber of presentations was exceptionally high. We heard from Zscaler CEO, Jay Chaudhry, about many industry-redefining innovations around AI-enabled security, data-driven business intelligence insights, and product enhancements which promise to further strengthen the Zscaler platform.

Honeypot Recon: MSSQL Server - Database Threat Overview '22/'23

In a constantly connected world, protecting sensitive data in what are often complex database structures requires staying up to date with cyber criminals’ malicious attack techniques, and infection methods. This research is an extension of another project which involves monitoring attacks carried out on database servers worldwide. Understanding how these bots work can keep your digital world safe and secure.

Understanding API Breaches: Insights from 'Outliers' and the Complexities of Cybersecurity

Over the last couple of decades in the cybersecurity industry, I have observed how APIs have gained significant importance in modern cloud-based architectures over the past few decades. In fact, they account for over 80% of all web traffic. However, this increased usage has also made APIs vulnerable to cyber threats. A closer look reveals that APIs are now one of the most prominent threat vectors in the cybersecurity landscape.

Lessons Learned from OT:ICEFALL - New Vulnerabilities and Insights on OT Security Design and Patching

In our final OT:ICEFALL report, Forescout Vedere Labs presents three new vulnerabilities and concludes the project after one year of research following the original disclosure. The OT:ICEFALL research, including 61 vulnerabilities affecting 13 vendors, has yielded three key insights into the current state of OT product security.

How Architects and Engineers Can Gain Faster Access to Newforma Content with Egnyte

Architects and engineers know that success depends on getting the right information to the right people at the right time. And when it comes to projects, having access to essential digital content from Newforma makes all the difference; but getting that content into a unified platform is critical.

Essen Health Care Gets Breached and Loses Patient and Employee Data

Essen Health Care is a massive healthcare network of facilities and providers throughout New York City, Staten Island, and Westchester County. With more than 300 providers at a range of facilities connected to Essen Health Care, the organization maintains and stores a huge amount of medical and personal data for patients, providers, faculty, and more. All this data is protected by security features, but it was exposed in a recent breach.

8 Attack Surface Management Advantages for Security Teams

In the digital era, managing your attack surface – the sum total of all potential attack vectors in your systems – is a critical part of your cybersecurity strategy. Attack Surface Management (ASM) provides the insights and tools necessary to understand, assess, prioritize and remediate risks faster and more effectively. In this post, we’re going to explore eight key ASM advantages for security teams, and the key product capabilities needed to achieve them.

5 Best Practices to Achieve a Trusted Wireless Environment

Complexity is the new normal, which applies equally to businesses’ networks and wireless environments. This is complicated further by the fact that cyberattacks that seek to exploit vulnerabilities in organizations' WLANs (Wireless Local Area Networks) are becoming increasingly sophisticated. On World Wi-Fi Day, we want to offer you security tips to create a safer wireless environment.