Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Continuous Adaptive Trust: The Key to Agile Cybersecurity

First coined by Gartner in 2021 (subscription required), the term continuous adaptive trust is gaining popularity. This new authentication model might be the solution to constantly evolving threats, strict regulatory requirements, and cloud vulnerabilities. Continuous adaptive trust represents a shift in cybersecurity, moving beyond traditional static access management models to a dynamic, real-time approach that continuously evaluates trust levels based on changing risk factors.

CrowdStrike Named a Leader in 2024 Gartner Magic Quadrant for Endpoint Protection Platforms

CrowdStrike is proud to be named a Leader in the 2024 Gartner Magic Quadrant for Endpoint Protection Platforms. We believe this recognition clearly demonstrates the power of the CrowdStrike Falcon cybersecurity platform and our unwavering commitment to innovation in strengthening endpoint security for our customers.

Encryption at rest in Elastic Cloud: Bring your own key with Google Cloud

Now that we’ve introduced Elastic Cloud encryption at rest and walked you through setting it up in AWS and Azure, it’s time to get you set up in Google Cloud. In this final blog of the series, we will explain how encryption at rest works with Google Cloud Key Management Service (KMS) and then show you how to apply a Google Cloud KMS key to an Elastic Cloud Hosted deployment for encrypting data and snapshots at rest.

Leveraging ASPM for Maximum Impact: A Security Leader's Guide

For assessing and reporting on the risks associated with your applications, you know you need Application Security Posture Management (ASPM). However, this quickly evolving space has many variables that security leaders may not realize. Here’s how you can elevate your security strategy by optimizing ASPM tools in a way that minimizes risks, enhances operational efficiency, and builds a robust security-aware culture in your organization.

Understanding Network Attacks: Types, Trends, and Mitigation Strategies

At a time when digital connectivity is the lifeblood of all business operations, the specter of network attacks is greater than ever. As entities depend on complex network infrastructures, malefactors exploit vulnerabilities with growing sophistication and frequency. Understanding the diverse nature of these threats—from DoS and DDoS attacks to reconnaissance exploits—is crucial for devising effective defense strategies.

Bridging the cloud security skill gap with Sysdig Sage

Disruptive technologies have a learning curve in the pace of adoption and implementation. Training and education tend to follow a slower schedule and can have a hard time keeping up with discoveries happening on the bleeding edge. This is part of what led to the current cloud security skill gap. The cloud transformed software development, accelerating innovation and the pace of human creativity. But, we now know that it also formed new security challenges.

EP 62 - The Evolution of Identity

In this episode of the Trust Issues podcast, host David Puner sits down with Jeff Reich, Executive Director of the Identity Defined Security Alliance (IDSA), a nonprofit that provides vendor-neutral guidance on identity-centric security strategies to help organizations reduce the risk of identity-related attacks. They explore the evolution of digital identity, discussing how it has transformed from simple identifiers to complex, multifaceted digital identities for both humans and machines.

Protect Users Everywhere with Integrated Zero Trust Hybrid Security

In this second blog of our series, we embark on a journey of Branch Transformation with the Next Gen SASE Branch solution. Built on the Netskope One SASE platform, the Next Gen SASE Branch solution combines its three layers—Context-aware SASE Fabric, Zero Trust Hybrid Security, and a SkopeAI-powered Cloud Orchestrator—into a unified cloud offering. The three layers are defined below.

Feed me!

Corelight has strengthened the Suricata integration within its Open NDR Platform, empowering customers with a custom ruleset, the Corelight Feed, designed to swiftly detect and help respond to emerging threats. With a new monthly update cycle, Corelight ensures that organizations stay ahead of the latest vulnerabilities and enhance their network security posture effortlessly.

Announcing "Crafting Secure Software," GitGuardian's Guide to Security by Design!

Exciting news! Our first book, "Crafting Secure Software," is now available. Learn how to embed security throughout the SDLC, mitigate risks, and foster a security culture. Get your copy today and level up your software security game!