Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Active Directory Incident Response: Key Things to Keep in Mind

Active Directory (AD) is crucial for network security as it controls access to sensitive data, making it a primary target for attackers. Even a small AD breach can result in significant data loss, operational downtime, and reputational damage in a business.

Inside APT34 (OilRig): Tools, Techniques, and Global Cyber Threats

This blog is the latest in a series that delves into the deep research conducted daily by the Trustwave SpiderLabs team on major threat actor groups currently operating globally. APT34, also known as OilRig, Earth Simnavaz, and Helix Kitten, is a sophisticated, state-sponsored cyber threat group with suspected ties to Iran.

The Evolving Role of AI in Data Protection

Each year, Data Protection Day marks an opportunity to assess the state of privacy and security in the midst of technological innovation. This year’s inflection point follows a robust dialogue on AI from last week’s World Economic Forum Annual Meeting in Davos. As CrowdStrike participated in these discussions, we emphasized the importance of leveraging AI to defend against ever-evolving cyber threats and protect the very data and workloads used to power AI.

The Life of Pi - Privacy Leaders and Their Everyday

In today’s data-driven economy, enterprises are under increasing pressure to manage privacy risks effectively. The responsibility of identifying and mitigating these risks often falls on lawyers and Chief Data Privacy Officers (CDPOs), who must navigate complex regulatory landscapes, safeguard sensitive data, and ensure their organizations maintain customer trust.

Modernize Your Directory Without Compromising Linux Security

In today’s threat landscape, you’re at risk if you don’t have all your identities—human and machine—secured with the right level of intelligent privilege controls. And the risk is even more significant when identities and privileges on your mission-critical Linux servers, especially those that run critical workloads or have sensitive data, are managed in silos, separately from the rest of the infrastructure.

Why Independent Security Testing Matters: Lessons from Cato SASE's Efficacy Evaluation

As adults, we rarely question the safety of the medicine we consume. This confidence stems from knowing that these products undergo rigorous, independent testing before reaching pharmacy shelves. Security solutions, especially those critical to enterprise operations, deserve the same level of scrutiny. Before trusting a platform to safeguard our data and systems, it’s essential to verify that it can counter the sophisticated threats we face today.

Breaking Down Signature-Based Detection: A Practical Guide

Nearly 90% of cyberattacks are known methods that proper systems can detect, but most organizations don’t have the best defenses. Signature-based detection is a vital aspect of cybersecurity. It offers some benefits but also has some drawbacks. This blog will break it down simply to help you strengthen your defenses against new threats.

Automating Browser Extension Security with LimaCharlie and Secure Annex

As browsers increasingly become users' primary operating systems for accessing analytics, financial, and other sensitive data, their security requirements are evolving. While browser developers invest significant resources in secure development, one vulnerability remains difficult to address: browser extensions. Browser companies must maintain extension flexibility to allow users to customize their web browsing experience.

Can You Really Block Bots with Robots.txt? The Truth Behind Bot Control

If you’re looking for a quick way to block bots with robots.txt, you may be disappointed to learn that it’s not as effective as many people think. Robots.txt is often discussed as a simple solution for controlling crawler traffic, but in reality, it provides very limited protection.