Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How NTFS Alternate Data Streams Introduce Security Vulnerability

You may not be familiar with NTFS file streams, but you use them every day when you access files on any modern Windows system. This blog post explains this feature of NTFS ADS, shows how hackers can exploit file stream functionality in cyberattacks, and offers strategies for defending your organization.

How to Prepare for the Next Zero-Day Attack

Sudden, unexpected, and potentially very damaging. Zero-day attacks are the perfect storm for malicious actors and one of the worst-case scenarios for developers, security professionals, and DevOps teams. Yet it’s not all bad news for those charged with protecting your code, software, and applications, as long as you expect the unexpected and prepare for it. Building a fast, effective mitigation response for zero-day attacks starts with these three tactics.

Best practices for application security in cloud-native environments

Editor’s note: This is Part 3 of a five-part cloud security series that covers protecting an organization’s network perimeter, endpoints, application code, sensitive data, and service and user accounts from threats. In Parts 1 and 2 of this series, we discussed the importance of protecting the boundaries of networks in cloud environments and best practices for applying efficient security controls to endpoints.

Latest Cyber Guidance for Retailers from NCSC

The National Cyber Security Centre (NCSC) recently published important cybersecurity guidance to help protect retailers, which comes right as the holiday shopping season is in full swing. Retail organizations are no strangers to cyber attacks. In fact, some recent large-scale retail industry cyber attacks have included popular brands such as Guess, Under Armour, CVS Health, Home Depot, and Target.

Sponsored Post

Phishing Alert: How to Identify and Avoid Phishing Attacks

Phishing is a type of attack that attempts to steal your personal information, such as your login credentials or credit card details. Cybercriminals use phishing attacks to gain access to your account and steal your data. In this blog post, we will discuss how to identify and avoid phishing attacks. We will also provide tips on how to protect yourself from these types of attacks.