Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Swimming in the Deep End: Data Leaks and the Deep Web

Those interested in how data breaches occur should be familiar with the general topography of the Internet. In our previous piece, we discussed the difference between the surface web, deep web and dark web. Most estimates about the topography of the Internet conclude that the deep web makes up between 95%-99% of all web sites. The dark web likely comprises less than 1%, while the surface web accounts for only a few percentage points itself. Nearly the entire Internet is the deep web.

4 Must-Have Qualities of a File Server Replacement

It’s no surprise that data creation is rapidly growing, but did you know that we’ve actually created 90% of the world’s data in just the last two years alone? With that kind of growth rate, it’s no wonder that traditional file servers are having trouble handling these massive data sets. To compound the issue, as businesses create and share more data, it’s at greater risk of being stolen, ransomed or misused.

Financial Services Impostor Email Attacks Increased More than 60% Year-Over-Year

Impostor email attacks are a growing trend and problem. Attackers will target your employees, customers, and business partners with these advanced attacks. It is now widely known that Cybercriminals aim to exploit users within organizations rather than the technology. Their sole purpose, to steal money and information which could prove financially valuable.

12 Common Tools for Your DevOps Team

DevOps is revolutionizing the way enterprises deliver apps to the market by blending software development and information technology operations. This convergence creates an assembly line for the cloud, as Tim Erlin wrote for The State of Security, by increasing the rate at which companies can develop apps and deliver them to users.

How hospitals can secure patient data by equipping clinicians

Healthcare breaches continue to be featured in the news. Hospitals continue to be ideal targets for hacking and other cybersecurity threats. This is evidenced by the increasing number of cyber attacks, including sophisticated ransomware attacks on hospitals. Many hospitals are beefing up their technologies and infrastructure to address the threat of cyber attacks. But they are neglecting a major weak link in data security: the clinicians.

Secure deployments using Kubernetes admission controllers

Kubernetes admission controllers are a powerful Kubernetes-native feature that helps you define and customize what is allowed to run on your cluster. An admission controller intercepts and processes requests to the Kubernetes API prior to persistence of the object, but after the request is authenticated and authorized.

Office 365 Phishing Attacks: Educating Our Attackers...

Why are hackers increasing levels of Office 365 phishing attacks? This article will explain some key processes how and why Office 365 phishing attacks are a persistent and ever evolving threat. Additionally, why we may be arming our attackers with the exact same education as we provide our own users…

Privileged Access Management Issues? Enter Tripwire Password Manager

So, you have 2000 network devices in your environment and everyone is telling you that you have to rotate all 2000 device passwords every 30, 60 or 90 days (at a minimum) — who has time for that?! How are you going to manage this? The task seems monumental and time-consuming! If nothing is done, then your security/compliance posture will worsen due to reusing passwords that are easy to remember across assets. In addition, passwords could become stale and give adversaries more time to crack them.

Cloud Services: Your Rocket Ship Control Board

The move to the cloud — in many ways — is a return to the early days of computing. When I took my first computer class in 1978, we used an IBM 360 system time share. We rented out time on a remote system — sent our jobs over a modem to a computer at a university — and got back the results of the program run. Today, we’re using the cloud, which is just a fancy version of the old time-share systems.