Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Cloud TAP Arrives for Traffic Packet Captures

Netskope customers now have the option for traffic packet captures for Netskope Intelligent SSE for egress traffic from remote users or offices to the Netskope One cloud platform. Key to enabling this new capability is the NewEdge private network where Cloud TAP is available across the globe in data centers. Networking, infrastructure and operations, and security teams often require the following using network and cloud TAPs.

SecurePortal Release 2.8 - Welcome to Role-Based Access Control

Over the past few months, our development team at SecurePortal has diligently worked on a major upgrade to our access control system. In this significant update, we have revolutionised how organisations can manage and restrict access within the portal. By empowering organisations with permissions to regulate and customise visibility for specific groups, we offer the flexibility to create new groups, duplicate existing ones for customisations, and seamlessly assign users to these tailored groups.

Ransomware Gangs Poised to Exploit Veeam Backup & Replication Vulnerability (CVE-2024-40711)

The critical CVE-2024-40711 vulnerability in Veeam Backup & Replication (VBR) is drawing attention from security researchers and ransomware groups alike. Discovered by Florian Hauser from Code White, this flaw allows attackers to take full control of enterprise systems, posing a significant threat to the integrity of data backup infrastructures. With ransomware groups historically targeting Veeam vulnerabilities, CVE-2024-40711 could soon become a valuable tool for cybercriminals.

New archTIS Trusted Data Integration Solution for Structured Data

This week, during LandForces 2024 archTIS announced the launch of archTIS Trusted Data Integration, a new lightweight, fast, and agile solution for integrating, securing, and governing sensitive and classified structured data from multiple sources at scale and speed.

Enhancing CISO-Board communication: Three key questions for the CISO to answer

A challenging dynamic exists between the CISO and the Board of Directors. While both stakeholders focus on risk management, their approaches to risk and the language they use are notably different. Though regulations like the NIS2 directive and SEC cybersecurity disclosure rules have given CISOs a bigger seat at the table, the legal requirements and operational prioritization to meet them have exposed a difference in perspective and understanding between the two roles.

From Risk to Reward: How 20% Revenue Growth Was Achieved Through Strategic Security

If you're a security professional like me, you're not used to your function being seen as a revenue driver for your business; you’re used to being seen as a cost center. But what if you could demonstrate that security acts as a catalyst for innovation, even leading to 20% revenue increase? Here's how a strategic security investment was not only able to help protect a business from potential threats, but also create a foundation for sustainable growth.