Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Security Awareness and Log Management for Security Analysts

For today’s remote workforce, security professionals need technical security awareness education distinct from the rest of the company’s “don’t click a phishing link” training. Security analysts know how to recognize phishing emails and set secure passwords. However, where does that leave them when it comes to security awareness?

How to Protect Your Organization from Pretexting

Pretexting can occur anywhere at any time, so it’s important to understand what it is and ways you can protect employees from it. You can protect your organization from pretexting by not clicking on unsolicited links, not sharing personal information online and by educating employees on pretexting techniques. Read on to learn more about pretexting and the techniques used by cybercriminals to get victims to reveal sensitive information.

BYOD Security: Using ABAC to Manage Access to Sensitive Data

The concept of Bring Your Own Device, or BYOD, has been adopted by organizations wanting to take advantage of the benefits. BYOD allows employees to use their personal devices to connect to their business networks and access work-related resources using smartphones, personal laptops, tablets and USB keys. But is a BYOD strategy good for security? Along with the benefits come increased BYOD security risks that require mitigation.

The Security Implications of A Digital Twin

Digital twins are digital replicas of physical assets, processes, and systems, and they are used to perform simulations and analysis to optimise the real-world performance of those assets, processes, or systems. They have become increasingly popular in many industries, including manufacturing, healthcare, and transportation. However, as digital twins become more prevalent, it is important to consider the cybersecurity implications of these technologies.

Importing Logs from FluentD into Falcon LogScale

One of the primary debugging tools for a cloud-native developer is the simple, humble log file. Some malfunctioning systems can be impossible to debug without them. FluentD is an open source log collector that provides unified log processing across multiple emitter systems, either on the same logical device or separate devices. For example, on a single k8s pod, logs are emitted from the pod itself, the container running in the pod and the microservice running in the container.

Ask a CISO Series: Part 1 - What will be the top cybersecurity threats in 2023?

As we look towards 2023, it is important to gain insight from top cybersecurity experts on the emerging threats and trends in the field. In this interview series, we spoke with four leading CISOs in order to gain their perspective on the threats, trends, and their personal goals as CISOs in 2023. Meet our panel of distinguished CISOs who will impart their foresight and guidance on the future of cybersecurity in 2023. ‍ ‍

CREST Vulnerability Assessments: The Total Guide

Established in 2006, CREST, or Council of Registered Ethical Security Testers is a non-profit membership body. It aims to vet both cybersecurity-providing organizations and security-testing individuals on their capacities, processes, and the standard of services provided. One of the accreditations provided by CREST is vulnerability assessments provided by companies. They are then differentiated as CREST vulnerability assessments.

Third Party Risk from Supply Chain Attacks Will be Gift that Keeps Giving in 2023

Last month, over the holidays, we witnessed multiple vendors experience security breaches of varying levels of severity. From LastPass and Okta to Slack and CircleCI, the news has been filled with headlines reporting on the aftermath of these incidents. We wanted to briefly cover these stories and discuss their implications for you in the current year.