Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How is Data Stored in Confluence?

Confluence is one of Atlassian’s most popular collaboration tools, a team workspace where users can create, capture, and coordinate on a variety of project types. Confluence’s role as a hub for sharing documents and creating templates means that, for many organizations, some of their most confidential data may live within their Confluence spaces.

How Enterprises are Leveraging Rubrik's Technology to Power Digital Transformation in a Constantly Changing Environment

As the pandemic continues to impact businesses all over the world, new challenges have emerged for business leaders - particularly in the retail and consumer sectors of the market. At Rubrik, we partner with leading global system integrators and delivery partners to solve the most difficult challenges enterprises face in these verticals.

Featured Post

The Evolution Of Cybersecurity Over The Decades

For almost as long as there have been computers, there have been people who want to get the information from the computers of others. As such, the history of cybersecurity follows very much step-by-step with the history of modern computing. In 2021, just as computing is an essential part of everyday life, cybersecurity has been a vital investment that every business or organisation needs. When the world's largest companies and even its richest countries' infrastructure can be vulnerable to cybercriminals, it shows that anyone can fall victim to data breaches.
Featured Post

4 Most Common Types of Cybersecurity Threats

There's every indication that the pandemic is changing the nature of cybersecurity. Online threats are evolving to match our new remote-work paradigm, with 91% of businesses reporting an increase in cyberattacks during the coronavirus outbreak. Hackers are getting more and more sophisticated and targeted in their attacks. Many of these cyber threats have been around for a while, but they are becoming harder for the average user to detect. Beware of these four common types of cyber threats - and learn what you can do to prevent them.

Why are cybercriminals suddenly targeting maritime infrastructure?

If you were asked to list out the top problems society has been facing in 2020, cyberattacks on the maritime industry might not be an obvious issue that would come to mind. But the industry has seen a worrying trend in recent months, as a spike in cyberattacks that has left some of the biggest companies in the industry exposed. Specifically, both the fourth largest global shopping company and the International Maritime Organization (IMO) have been targeted in these attacks.

Detectify security updates for January 11

Our Crowdsource ethical hacker community has been busy sending us security updates, including 0-day research. For Asset Monitoring, we now push out tests more frequently at record speed within 25 minutes from hacker to scanner. Due to confidentially agreements, we cannot publicize all security update releases here but they are immediately added to our scanner and available to all users. The following are some of the security vulnerabilities reported by Detectify Crowdsource ethical hackers.

The Importance Of Threat Intelligence Sharing Through TAXII And STIX

Threat intelligence has been a very important asset to cybersecurity- knowing in advance some properties of malicious actors is key for preventing security incidents. Most typically these properties are IP addresses, domains, emails and file hashes, and being able to compare them to what’s happening in your infrastructure allows for quick response and prevention.

Improve Your Security Posture By Focusing on Velocity, Visibility, and Vectors

In the wake of the widely publicized FireEye breach and the alarming SolarWinds supply chain attack, this presents an ideal opportunity for reflection on the broader shift taking place across the world—the transition from legacy on-prem infrastructures to the cloud.