Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

What is PCI Compliance?

In today’s fast-moving and competitive marketplace, you can barely find any businesses and merchants that still haven’t adopted the use of credit cards for their services. More than a third of American cardholders use credit cards for their transactions on a monthly basis. With the rising prevalence of identity theft, over 1.1 billion personal records were exposed by data breaches and credit card fraud alone.

4 Ways to Reduce Vendor Risk in Finance

The finance industry has the second highest average data breach costs at US$5.97 million per breach, according to IBM and Ponemon Institute’s 2022 Cost of a Data Breach report. While strict regulations force finance companies to invest heavily in protecting customer data, their third-party vendors don’t necessarily do the same. Finance security teams need a proactive approach to third-party risk management. Visibility into your vendor’s attack surface is critical.

Keeper Launches Share Admin To Streamline Sharing Between Privileged Users

Keeper Security, the leading provider of zero-trust, zero-knowledge and FedRAMP Authorized cybersecurity software, today announces the launch of Share Admin, a powerful new feature for its award-winning Enterprise Password Management (EPM) Platform. Share Admin is a role-based permission that gives designated administrators elevated access rights over their organization’s shared folders and shared records.

Playing Hide-and-Seek with Ransomware, Part 2

In Part 1, we explained what Intel SGX enclaves are and how they benefit ransomware authors. In Part 2, we explore a hypothetical step-by-step implementation and outline the limitations of this method. Watch this live attack demo to see how the CrowdStrike Falcon® platform and the CrowdStrike Falcon Complete™ managed detection and response team protect against ransomware.

Why You Need To Update Your Software | Cybersecurity Awareness Month

Have you ever watched a scary movie where a young couple comes home to find the front door cracked open or windows thrown wide, curtains billowing in the autumn evening breeze? As the couple approaches the house, the tense music swells and we grip our armrests, struck by the terrifying realization that anyone — or anything — could be awaiting them inside.

Why Mitigate Flaws to Manage Risk: Advice from an Application Security Consultant

Documenting flaws that you don't prioritize today will save you time should they become high-severity flaws in the future. Here's the best way to approach them. The topic of mitigations is a commonplace source of questions and discussion for our Application Security Consulting group.

What is Vulnerability Remediation?

Vulnerability remediation is the process of finding, addressing, and neutralizing security vulnerabilities within an organization’s IT environment, which can include computers, digital assets, networks, web applications, and mobile devices. Remediation is one of the most important steps in the vulnerability management process, which is critical for securing networks, preventing data loss, and enforcing business continuity.

CrowdStrike Advances to Research Partner with MITRE Engenuity Center for Threat-Informed Defense to Help Lead the Future of Cyber Defense

CrowdStrike is now a Research Partner with the MITRE Engenuity Center for Threat-Informed Defense, joining a select list of cybersecurity companies and research foundations to take a hands-on approach to transforming state-of-the-art, threat-informed defense against sophisticated adversaries into a state of practice for organizations. Building on its previous role as Research Sponsor, CrowdStrike is reaffirming its commitment to fostering an open and collaborative security ecosystem.

The people have spoken and Splunk wins twice at the ITAwards

You know that us Splunkers love to go deep into use cases and figure out what helps our customers the most. However in today’s business world, industry recognition goes a long way in proving the value in the products and services we use. For example if you were Munich Airport, then it would speak volumes to others if your airport was named as a “First Five-Star Airport” or if you were Dachser Logistics and went on to win the “One Eaton Supplier Premier Award”.