Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Evolving cloud security: Why identity infused CDR is the key

Minimizing the time to detect, investigate and respond to threats is crucial in stopping cloud attacks. In fact, this might be the biggest understatement in cloud security today. Modern threat actors are escalating their tactics, making attacks faster, more aggressive, and increasingly difficult to stop. Cloud attacks occur at lightning speeds, leveraging automation to access sensitive data and resources before security teams can react.

A Leader in Both Security Service Edge and Single-Vendor SASE

Netskope is one of only two vendors positioned in the Leaders Quadrant in the Gartner Magic Quadrant reports for both key categories: Security Service Edge and Single-Vendor SASE. What’s more, the Gartner companion report, Critical Capabilities for Single-Vendor SASE, recognized Netskope as the only Single-Vendor SASE vendor that ranked among the 3 highest scoring vendors in all 3 Use Cases, with the highest score for the Zero Trust Platform Use Case (4.02/5.00).

Rubrik and Mandiant Join Forces to Bolster Cyber Resiliency Across the Whole Intrusion Lifecycle

In the ever-evolving world of cybersecurity, dealing with cyberattacks has become a daunting challenge for organizations across the globe. The aftermath of such attacks can be catastrophic, leaving organizations stymied for weeks or even months as they scramble to determine the true scope of an attack through recovering their data and systems.

Windows Downdate: Downgrade Attacks Using Windows Updates

Downgrade attacks—also known as version-rollback attacks—are a type of attack designed to revert an immune, fully up-to-date software back to an older version. They allow malicious actors to expose and exploit previously fixed/patched vulnerabilities to compromise systems and gain unauthorized access.

Fortify Digital Resilience with Splunk + Cisco Talos Incident Response

On the day that Splunk officially became part of Cisco, our leadership outlined key ways we’d come together to support customers to achieve business-critical outcomes, noting: In the short time since then, we’ve already made significant strides, demonstrated by our announcements of: As we continue to build on this momentum, we’re excited to announce the availability of Cisco Talos Incident Response services to Splunk customers.

Data Reveals Unaligned Leadership: Business, IT, and Cybersecurity Don't Share Priorities - But They Should!

In the rapidly evolving cybersecurity landscape, alignment between business priorities, IT, and cybersecurity strategies is crucial for organizational resilience. However, the 2024 LevelBlue Executive Accelerator, based on the 2024 LevelBlue Futures Report, reveals a significant disconnect among technology-related C-suite executives—CIOs, CTOs, and CISOs. This disconnect highlights how their divergent roles and priorities can lead to misalignment with broader business objectives.

Top 5 help center articles for tests

Running tests against your security controls and other systems is a critical aspect of protecting your organization from a potential data breach and ensuring that you maintain compliance. Vanta’s platform has automated tests with continuous monitoring that run on an hourly basis against your controls as well as customized tests that you can adapt to your organization's needs.

Tech Analysis: Addressing Claims About Falcon Sensor Vulnerability

CrowdStrike is aware of inaccurate reporting and false claims about the security of the Falcon sensor. This blog sets the record straight by providing customers with accurate technical information about the Falcon sensor and any claims regarding the Channel File 291 incident. CrowdStrike has provided a Technical Root Cause Analysis and executive summary that describes the bug in detail.

62% of Phishing Emails Bypassed DMARC Checks in 1H of 2024

A report from Darktrace has found that 62% of phishing emails in the first half of 2024 were able to bypass DMARC verification checks in order to reach users’ inboxes. “Building on the insights from the 2023 End of Year Threat Report, an analysis of malicious emails detected by Darktrace / EMAIL in 2024 underscores the implication that email threats are increasingly capable of circumventing conventional email security tools,” the report says.