Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

The New Cato Trust Center: An Essential Step for Today's Interconnected Enterprise

Transparency in security practices is essential for building trust in today’s interconnected digital world. Organizations that openly share certifications, audit reports, and policies demonstrate a commitment to safeguarding data and adhering to standards. This openness fosters stronger partnerships and sets a benchmark for accountability.

"SOAR isn't obsolete, it's just maturing": Tracking SOAR's AI evolution with Tines and GigaOm

In a recent webinar on SOAR’s evolving role in security and beyond, I chatted with Andrew Green, Networking & Security Research Analyst at GigaOm. We kicked things off with a brief discussion on Gartner’s Hype Cycle for ITSM report, which described the SOAR category as “obsolete” and prompted some commenters to declare that SOAR is “dead”.

Meet Spark, an AI Test Agent That Autonomously Uncovers Vulnerabilities

We’re thrilled to announce the general availability of Spark, an AI Test Agent that lowers the entry barrier to white-box fuzz testing. In this blog, we explain how Spark works and share the main results from its beta testing that prove its effectiveness.

5 Cybersecurity Trends for 2025: Preparing for a Year of Elevated Risk and Accountability

As security and risk leaders look to the year ahead, they face a rapidly evolving and dynamic set of challenges. The implementation of more stringent cybersecurity standards—such as the U.S. Security and Exchange Commission’s (SEC) rules and the EU’s Network and Information Security Directive 2 (NIS2)—has placed boardroom scrutiny at an unprecedented level.

11:11 Systems Celebrates 2024 Cloud Computing Backup and Disaster Recovery Award

We are grateful and honored to share that 11:11 Systems has been recognized by Cloud Computing Magazine with the 2024 Cloud Computing Backup and Disaster Recovery Award for the fourth year in a row. This recognition reflects not only the innovation and reliability of our services but, more importantly, the trust and partnership we share with our customers.

Industry Optimism Grows as TSA Proposes Balanced Cybersecurity Measures

The Transportation Security Administration (TSA) has proposed new rules requiring those under its jurisdiction to follow specific cyber risk management (CRM) requirements, report cybersecurity incidents in a certain timeframe, and address physical security concerns. This is positive news for the transportation industry, as hundreds of attacks have been leveled against the sector. These attacks have the potential to impact the supply chain, create chaos, and endanger human lives.

The Power of Data: The Foundation of Better Workforce Insights

Have you ever considered the amount of digital data your organization creates daily? From emails and chats to web browsing and application usage, this data isn’t just an operational byproduct—it’s a baseline of insights that can empower your business to address challenges across security, compliance, and workforce management. An astounding 70% of the world’s data is user-generated.

Four Ways Teleport Overcomes the Limitations of VPNs and Bastions

As organizations evolve to embrace cloud-native architectures and distributed teams, the limitations of legacy access solutions like virtual private networks (VPNs) and bastion hosts have become apparent. Once reliable for securing static, on-premises environments, these tools do not scale well for securing modern infrastructure, are expensive to maintain, increase security vulnerabilities, and can hinder regulatory compliance.

Introducing Policies: Smarter Controls for Managing Security Findings

At Jit, we’re all about empowering developers to build secure software without compromising agility. But as teams scale, enforcing strong governance and compliance practices while enabling flexibility can be tricky. That’s why we’re thrilled to announce Policies, a new feature that lets you customize controls over who can ignore security findings in Jit. With Policies, you can ensure security findings are addressed appropriately based on risk, context, and compliance requirements.

Importance of Speed in Threat Intelligence

The threat landscape is evolving at an unprecedented rate, with organisations facing increasingly complex and malicious cyber threats. As cyber-attacks grow in frequency and sophistication, Cyber Threat Intelligence (CTI) has emerged as a critical focus for many organisations striving to counter these rising challenges effectively.