Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Hybrid Work Is Only Viable with Unified Cybersecurity

It should be no surprise that both knowledge workers and the companies that employ them want to benefit from hybrid work environments. After two years of a new remote workplace routine, businesses must provide workplace flexibility to compete for the best talent, allowing employees the option of working from a corporate office or elsewhere.

CIS Control 2: Inventory and Control of Software Assets

Modern organizations depend upon a dizzying array of software: operating systems, word processing applications, HR and financial tools, backup and recovery solutions, database systems, and much, much more. These software assets are often vital for critical business operations — but they also pose important security risks.

CIS Control 16: Application Software Security

Modern IT environments typically include a wide range of applications: software developed in house, hosted software platforms, open-source tools and purchased solutions. Because these applications access sensitive systems, data and other IT assets, cybercriminals are eager to exploit them during attacks. CIS Control 16 offers application software security controls for strengthening your organization’s security posture.

Key Attributes You Need to Consider When Selecting a Cloud Security Platform

As more and more businesses move towards cloud-based operations and embrace digital transformation, security is increasingly becoming an important question. As an enterprise migrates to the cloud, its assets and data resources need to be migrated as well, and that might expose the sensitive information.

Cyber threats increasingly target video games - The metaverse is next

The technical infrastructure of video games requires a significant level of access to private data, whether through client-server side interactions or financial data. This has led to what Computer Weekly describes as a ‘relentless’ attack on the video game industry, with attacks against game hosts and customer credentials rising 224% in 2021.

Teleport 9 - Introducing Machine ID

In this blog post we're excited to announce Machine ID, an easy way for developers to secure machine-to-machine communications based on X.509 and SSH certificates. But before we go deeper, let’s step back and think about what’s happening during a hacking attempt. Every security breach has two things in common. Addressing cybersecurity challenges requires a solution to both.

Do you use a Zero Trust Strategy when you relocate your sensitive files to another location?

We are all too familiar with the ongoing war between Russia and Ukraine. Amidst this crisis, the deputy chief of Ukraine’s state service of special communications and information protection Victor Zhora quoted that his department was planning for a contingency to be ready for any Russian threat to seize sensitive government documents.

Insider Risk: Are You Monitoring Employees Working Outside Your Network?

Every employee is hired to do a job, but every employee also represents potential risk to their company. In the past year, 68% of employers have noted an increase in insider attacks. The top attacks include fraud, monetary gain and IP theft and cost companies millions of dollars. One major reason for an increase in insider risk in the past year is remote work. Not only are people outside of their manager’s physical view, they are often working outside of their company’s network.