Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Higher Ed Campuses Have Digitized: Protecting Sensitive Data Requires a Unified Approach

Higher education institutions have long been subjected to ransomware and other cyber attacks, which has had a huge impact on their operations. In 2020 alone, ransomware attacks affected nearly 1,700 U.S. schools, colleges and universities – which is an increase of 100% over the previous year. The average cost of these attacks were $2.73 million in downtime, repairs and lost opportunities.

How attackers leverage example apps/reproduction scripts to attack OSS maintainers

A possible method of attacking your code base is a bit of social engineering that involves using open source to report potential bugs in software that provides reproduction applications. These applications can include malicious code that can compromise your software and applications. In the blog post, we’ll briefly look at why and how they operate, and how to mitigate this practice.

How to Shape OPA Data for Policy Performance

In Tim Hinrich’s prior blog titled the Three-Body Problem for Policy, he dives into the interconnected relationship between policy, data and software. He identifies a key consideration when using OPA — that “policies can only be evaluated when provided with the correct data.” The full blog is well worth the read to better understand the role of data and its correctness in your policy implementation.

ML Detection of Risky Command Exploit

As described in Splunk Vulnerability Disclosure SVD-2022-0624, there is a list of SPL (Search Processing Language) commands that are classified as risky. This is because incorrect use of these risky commands may lead to a security breach or data loss. As a precautionary measure, the Splunk Search app pops up a dialog, alerting users before executing these commands whenever these commands are called.

Is any organisation risk and data breach free?

I walked into a business the other day. After a long conversation about the client’s need for cybersecurity and the implementation of the ISO27001 security standard, we talked about their risk appetite. “We don’t accept any risk. We’re risk-averse” said the CEO. But, is this achievable?

The EU's new AI Act-What We Can Learn From the GDPR

Artificial Intelligence (AI) is rapidly becoming ubiquitous in supporting key business decisions, and for many organisations it is critical for their digital transformation and new business models. With organisations quickly driving forward to identify new ways to extract competitive value from their data, the regulators are preparing to step in.

Hack the Box Business CTF 2022: A hacking competition for companies

On 15th July 2022, a team of Bulletproof penetration testers took part in the online Hack the Box Business CTF competition. The CTF (Capture the Flag) event consisted of almost 3000 participants, with each player putting their ethical hacking expertise to use in a number of challenges. There were also prizes up for grabs for the top three teams on the leaderboard. This was the first year Bulletproof entered the competition and we look forward to competing in next year’s event.

What should a CISO's priorities be for reducing inbound and outbound email risk in M365?

While cybersecurity risks are similar across the board for any IT leader, it's down to each CISO to decide what takes priority. Before doing that, they need to assess the risks and plan accordingly for them. Unfortunately, many businesses don't do this. A 2022 UpCity study – the Small Business Cybersecurity Survey Investigations Report – found that only 50% of SMBs have a cybersecurity plan.

How and Why We Added Themes to the Rubrik SaaS Platform

Assume breach and recover faster Protect your data from the inevitable Recover safely, quickly, and precisely Assume breach and recover faster Register Now As a part of our continuous efforts towards modernizing the Rubrik SaaS platform, we recently added multi-theme support. We offer Bright and Dark themes, promoting consistency between different applications. Themes specify the colors of components, the darkness of the different surfaces, the level of shadow, and more.

Your Network Data Is Gold - Uncover It Faster With Forward Networks' NQE

Your network, security, and cloud teams spend a lot of time and energy trying to extract timely insights from your enterprise network data, so your organization stays on top of risks and continually improves network performance. But what if they could quickly search your network environment like a database to better understand everything in it — and whether those objects were operating as they should?