Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Non-repudiation: Your Virtual Shield in Cybersecurity

In the digital world, where countless users communicate, share data, and engage in diverse activities, determining the origin and actions behind these interactions can be quite challenging. This is where non-repudiation steps in. Coupling other security factors, such as delivery proof, identity verification, and a digital signature, creates non-repudiation. This guarantees that the parties involved in the transmission are unable to renounce the execution of an action.

GenAI Attack Path Remediations for Panoptica

Generative AI technology is rapidly evolving, offering groundbreaking capabilities in various fields, including cloud native environments and CNAPP (Cloud-Native Application) solutions. Development of generative AI technology holds immense promise for enhancing the capabilities and performance of cloud-native environments and CNAPP solutions.

Smart thresholds: The answer to your security alert fatigue

SIEM solutions operate based on thresholds. These thresholds serve as predefined benchmarks that generate alerts when the alert criteria is met. While effective to some extent, this approach falls short on multiple fronts, particularly in the context of sophisticated attacks and dynamic environments. Static thresholds falling short One of the fundamental flaws of static thresholds lies in their rigidity.

"The best inspiration comes from other builders": inside the Security Automation Roadshow

Last month, we hosted our inaugural Security Automation Roadshow in San Francisco, bringing our brilliant community of builders together for knowledge sharing, interactive learning, and, of course, workflow building. Speaking at the event, our co-founder and CEO Eoin Hinchy shared the inspiration for the series. Earlier in his career, he saw how important community and peer-to-peer networking can be for both organizations and individual professional development.

Twilio's Prima Virani on democratizing security and tackling burnout through automation

In this episode of The Future of Security Operations podcast, I'm joined by Prima Virani. Prima is a security engineer who worked across industries as varied as oil and gas and Fintech before becoming Principal Security Engineer at Twilio. With over a decade of experience spanning infrastructure security engineering, incident detection and response, and forensics, she's also shared insights at countless security conferences around the world, including SecTOR Canada and Agile India.

Why We Should Probably Stop Visually Verifying Checksums

Hello there! Thanks for stopping by. Let me get straight into it and start things off with what a checksum is to be inclusive of all audiences here, from Wikipedia : “A checksum is a small-sized block of data derived from another block of digital data for the purpose of detecting errors that may have been introduced during its transmission or storage. By themselves, checksums are often used to verify data integrity but are not relied upon to verify data authenticity.”

Unlocking Faster Drug Discovery with Streamlined Metadata

The Life Sciences industry relies heavily on navigating massive volumes of data securely and efficiently to advance drug development and fuel new innovations in Research & Development (R&D). However, decentralized data and inconsistent metadata classification can hinder scientists from locating information, verifying quality, and reproducing findings, thereby, slowing down drug development timelines.

Advancing Healthcare Cybersecurity: Embracing the Full Spectrum of Zero Trust

The healthcare industry, which is entrusted with people’s most sensitive data, is no stranger to cyber-attacks and breaches. This is supported by statements made on behalf of the American Hospital Association revealing that healthcare cyberattacks in 2023 affected more than 100 million people.