Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Demo Hub launched for Kondukto Technology Partners

For quite a time we have been thinking about ways to make it easier for Kondukto users to try out the integrations of our Technology Partners. At this year’s RSA in San Francisco we are now happy to announce the first release of our Demo Hub. This industry-first feature, integrated right into the Kondukto platform, makes it easier for customers to evaluate and benchmark different solutions from the growing number of Kondukto’s Technology Partners.

ScorecardX Integrates with OpenAI's GPT-4

As part of SecurityScorecard’s commitment to making the world a safer place, we are now the first and only security ratings platform to integrate with OpenAI’s GPT-4 system. With this natural language processing capability, cybersecurity leaders can find immediate answers and suggested mitigations for high-priority cyber risks.

Tigera Named Winner of the Esteemed Global InfoSec Awards during RSA Conference 2023

The annual Global InfoSec Awards from Cyber Defense Magazine (CDM) have been announced, and we are excited to unveil that Tigera has won the ‘Hot Company: Container Security’ category! This award recognizes the value of the work Tigera does as a security company, and we wouldn’t be where we are without the support of our teams, customers, and community. “We are honored to be recognized as one of the best in container security by Cyber Defense Magazine.

AI Risks (& the Race to Manage Them)

Great innovations bring great risks — including artificial intelligence. You may be aware of the cutting-edge capabilities, but have you considered the risks of AI? A few weeks ago, my colleague wrote on the dangers of ChatGPT, focusing on the risk of adding third parties to your ecosystem. Since then, things have only gotten worse.

Countless Medical Patients Get Exposed in Shields Healthcare Group Data Breach

Shields Healthcare Group is a technologically advanced health service provider that works with independent and large medical providers. The company manages health data, offers online services, and works to help medical providers keep their information secure and organized. This large-scale provider recently experienced a data breach that left them in a dangerous situation that could put countless patients at risk.

Root Cause Analysis for Deployment Failures

Root Cause Analysis (RCA) is a technique used to identify the underlying reasons for a problem, with the aim of trying to prevent it from recurring in the future. It is often used in change management processes to help identify the source of any issues that arise following any modifications to a system or process. RCA is something Tripwire Enterprise is often deeply tied into too.

Cloud security 101: Understanding and defending your cloud infrastructure

Many organizations have either been formed in, or have migrated to cloud-based environments due to the efficiency, flexibility, mobility, cost savings, and other benefits. The majority of applications that are used today are incorporated with the cloud. Most of our data and processes exist in the cloud. But simple as it is, just uploading your files to the cloud or using services of the cloud, doesn`t guarantee that it`s secure.

What Australian Tech and IT Leaders Want to See in Australia's Cybersecurity Strategy

I think we can all agree that the Australian government has demonstrated its will to empower our country, its organisations and citizens to be more secure online. Australia has become a prime target for bad actors, and like my counterparts, I appreciate a government with a hands-on approach—one that recognises the criticality of cybersecurity.