Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

5 common misconceptions about workflow automation

The potential benefits of workflow automation for security teams are huge - from improved incident readiness to faster time to value, improved retention, and reduced errors, there lots of compelling reasons to adopt this technology. But there are also some popular misconceptions holding teams back from fully embracing workflow automation. In this blog post, I'll debunk some of the most common myths about workflow automation and explain why it's worth investing in for any security team.

Door-To-Door Scams: Common Types and How They Work

Over the years, door-to-door scams have become rampant, targeting unsuspicious homeowners with various tactics. The door-to-door scam involves individuals disguising themselves as sales representatives or service providers to access people's homes to gain personally identifiable information like social security numbers, properties, or money. There are various door-to-door scams, and understanding how they work is crucial to protecting oneself and the community.

How to Protect Your Business from Data Leaks

Friday, Jul 19th, 2024 In this blog, we're going to discuss how you can protect your business from data leaks that can result from insecure application programming interfaces. Cloud native applications are composed of loosely coupled microservices, which are predominantly intercommunicating via APIs.

CrowdStrike & Rubrik Customer Content Update Recovery For Windows Hosts

Joint customers utilizing Rubrik for immutable backup are recommended to utilize Rubrik in-place recoveries for impacted Windows VMware Virtual Machines (VMs), standard VM restores for Azure VMs, AWS EC2 instances, and live mounts for Hyper-V and AHV VMs. For VMware VMs this significantly reduces the recovery time by only recovering the changed blocks required to revert the VM to a snapshot before the 04:09 UTC CrowdStrike host update.

One Faulty File: Global Disruption

As I write this, billions of users are looking at “the blue screen of death.” Flights are grounded around the world, 9-1-1 service is offline in the entire state of Alaska, hospitals can’t check in patients, retailers cannot make sales because their POS systems are down, Newark airport has reverted to paper tickets for check-in, and countless other organizations are at a standstill. This is the top story on every major news site I’ve checked. What could cause this carnage?

What is a Brute Force Attack in Cybersecurity and How to Prevent it

In the world today, there is a plethora of critical data circulating the internet, leading to complex attacks like brute force attacks. Individuals who are after this data for the wrong purpose and who use brute force attacks to gain access to these data are called cyber attackers.

Security Made Easy: Mobile Security Purpose-Built for MSPs

Mobile devices are now an integral part of the way we work, and because of that, mobile security has become a necessity when it comes to protecting an organization’s data. Yet with many IT and security teams already stretched to the limit, the task of incorporating mobile security into their existing operations may seem like an impossible task.

A Brief History of Graduality

In the early hours of July 19th, 2024, CrowdStrike endpoints on Windows machines worldwide received a faulty content update, causing what is shaping up to be the one of the largest global IT outages to date. All over the world reports of Windows workstations and servers stuck in a boot loop with a BSOD were pouring in, impacting airlines, airports, banks, hospitals and many other critical infrastructures such as emergency services call centers, and the list goes on.

CrowdStrike Windows Outage

Across the world, Windows computers have by effected the dreaded Blue Screen of Death (BSOD). This appears to have been caused by an outage of services provided by cyber security provider, CrowdStrike, and has impacted a large number of organisations – from banks to airlines. According to recent announcements, “CrowdStrike is actively working with customers impacted by a defect found in a single content update for Windows hosts,” CrowdStrike CEO George Kurtz said on X.

The Cost of Complacency: Analyzing the Financial Impact of Cybersecurity Breaches

In today’s digital landscape, the importance of robust cybersecurity measures cannot be overstated. Yet, despite the clear and present danger posed by cyber threats, many organizations still underinvest in cybersecurity, operating under a false sense of security. This complacency can be incredibly costly, as the financial ramifications of cybersecurity breaches are staggering.