Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

7 Key Factors to Consider When Choosing a Modern PAM Solution in 2025

In 2025, global cybersecurity trends like the rise of Zero Trust, tightening data privacy and AI regulations and growing concerns over cloud security will only accelerate. Each of these evolving forces will also shift paradigms for the privileged access management (PAM) programs charged with safeguarding IT, cloud ops and third-party vendor users as they perform high-risk operations.

The Top 10 Reasons People Fail a CMMC Audit

The Cybersecurity Maturity Model Certification, version 2.0, is finally in effect, which means thousands of businesses that have roles in the Department of Defense supply line need to do the work to comply and pass their audits to receive certification. It’s inevitable that many of these businesses will fail their initial audits. The standards are high, the margin of error is narrow, and the timeline is tight.

Redacting Message Fields for Privacy Purposes

Many organizations today have strict data privacy regulations that they must comply with. These privacy regulations can often clash with the requirements of security, application and operations teams who need detailed log information. This how to guide walks you through redacting message fields for privacy purposes. At Graylog, many of the organizations who use our tool are logging sensitive data that may contain personally identifiable information, health related data or financial data.

Console Chaos: A Campaign Targeting Publicly Exposed Management Interfaces on Fortinet FortiGate Firewalls

In early December, Arctic Wolf Labs began observing a campaign involving suspicious activity on Fortinet FortiGate firewall devices. By gaining access to management interfaces on affected firewalls, threat actors were able to alter firewall configurations. In compromised environments, threat actors were observed extracting credentials using DCSync.

2025: The Year of Evolution in Identity Security by David Morimanno, Director of Identity and Access Management Technologies

The year 2025 will not be a revolutionary one, it will be evolutionary, with developments coming into effect that were necessitated by events and happenings in 2024, and solutions to address these events reaching maturity levels that allow an appropriate, comprehensive response. With threats like ransomware certain to continue, identity resilience is going to become more important in the year ahead and, as such, identity will become the critical component of security.

Securing Your Financial Ecosystem: A Guide to Managed Services for Supply Chain Detection and Response

A single breach can have devastating consequences in the highly regulated financial services industry. From reputational damage and customer loss to severe financial penalties, safeguarding your entire ecosystem is paramount. This blog explores the critical role of Managed Services for Supply Chain Detection and Response (SCDR) in securing your financial services organization.

The Importance of Visibility and Control in SSE

The cloud computing industry is worth almost $700 billion and still growing. Think about how much data your organization stores in the cloud — particularly if you have a remote or hybrid work structure. A security service edge (SSE) solution can help you keep this data secure. This technology protects cloud resources by monitoring and restricting data flow, regardless of location or device.

OpenShift Virtualization Fast Disaster Recovery with Trilio in AWS ROSA Baremetal

In my previous blog post, (OpenShift Virtualization Backup and Restore with Trilio in AWS ROSA Baremetal ) I discussed how to protect VMs running in OpenShift Virtualization, specifically in AWS ROSA Baremetal environments. In this post, I want to focus on how you can recover a VM in less than 3 minutes. When it comes to recovery in Kubernetes environments, many of us feel relatively at ease, especially if the Persistent Volumes (PVs) are not particularly large.

Opportunities & Risks for Digital-first Leaders in Business-led IT

In the digital era, the ability to adopt and integrate technology quickly has become a key driver of business success. Technology decisions are increasingly being made outside IT organizations as cloud-based tools, SaaS platforms, and low-code/no-code solutions become more accessible. Known as business-led IT, this trend democratizes technology, empowering business leaders to innovate independently.

Why Vulnerability Scanning Alone Isn't Enough: The Case for Penetration Testing

Organizations today face a rapidly evolving threat landscape, and as they plan their cybersecurity strategy and budgets, many may struggle with a key question: If I’m conducting regular vulnerability scans, and patching the vulnerabilities I identify, do I really need penetration tests as well? The answer is yes. While vulnerability scanning plays a vital role in identifying risks and vulnerabilities, relying solely on it for security creates blind spots.