Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How to Conduct an Identity and Access Management Risk Assessment

Identity and access management (IAM) plays a crucial role in security by helping to ensure that each user in the organization has access to only the data, systems, and other resources they need to do their job. This article explains the critical functionality of IAM solutions and how an IAM assessment can help you uncover essential risks to security, compliance, and business continuity. Then, it offers IAM best practices and guidance on choosing the right IAM solutions for your organization.

Reverse engineering eBPF programs

eBPF is one of the most widely used technologies in today’s computing ecosystem, starting from the cloud sector up to routing and tracing in companies like Cloudflare. Many companies are basing and transforming their core products to use eBPF as an alternative to kernel modules because of all the benefits it offers both on the business side and technological side. Since this shift is gaining a lot of momentum I wanted to shed some light on eBPF.

Implementing AI within your security strategy: 7 best practices

There’s a ton of media hype about the swift integration of AI across different business functions. It has also been reported that 98% of technology executives have paused their AI programs to establish guidelines and policies around its implementation. Depending on when and where you read about it, opinions on the speed of AI adoption vary. Nevertheless, AI is more than just hype.

Atlas Oil: The Consequences of a Ransomware Attack

Atlas Oil, a major player in the oil and fuel distribution industry, fell victim to a ransomware attack orchestrated by the Black Basta group. This attack not only compromised sensitive company data but also exposed a variety of documents that could potentially harm the company’s operations and reputation. Overall, Black Basta claims to have exfiltrated approximately 730 GB of data.

Insider Threat Indicators To Look Out For

Some of the potential indicators of an insider threat include users viewing data unrelated to their role, requesting access to privileged accounts and resources, downloading and transferring data, using unauthorized software and hardware, and unusual login behavior. Continue reading to learn in-depth about potential insider threat indicators to be on the lookout for in your organization and how to prevent them.

Why the DORA Regulation Matters Beyond the EU

The Digital Operational Resilience Act (DORA) is a robust cybersecurity regulation in the European Union (EU) taking effect next year. It is designed to help protect against evolving digital threats to financial systems. Like GDPR, the scope of DORA isn’t only limited to financial services companies and banks. Service providers in Information, Communications and Technology (ICT) and third-party vendors are also on the hook. If you haven’t been preparing, the time to be is now.

Essential Code Signing Compliance Checklist Beyond 2023 to Ensure Code Integrity

Code signing has successfully established itself in the backdrop of the rapidly transforming digital space as a critical security mechanism for software distribution. Through the digital signing of source code, developers and publishers offer users confidence about their software’s validity, founder, and quality. Though cyber threats had been positively enhanced, the demands for a high level of compliance and strict code signing requirements had become more necessary.

SMBv3 Vulnerabilities Explained

Workplaces have evolved. While hybrid and remote work existed before COVID-19, these working arrangements became even more prevalent during and after the pandemic. Today, workplaces offer the flexibility for employees to work and access company resources from anywhere worldwide, with the Server Message Block (SMB) protocol at the center of this.

How can unifying observability and security strengthen your business?

Bolster your organization’s observability and security capabilities on one platform with AI, anomaly detection, and enhanced attack discovery Organizations in today’s digital landscape are increasingly concerned about service availability and safeguarding their software from malicious tampering and compromise. The traditional security and observability tools often operate in silos, leading to fragmented views and delayed responses to incidents.

Discover Secure Remote Browser Isolation With Keeper Connection Manager

Remote access to company resources through web browsers has grown exponentially in recent years. With that growth comes an increased risk of exposing sensitive information and critical systems to customers, employees and contractors, on insecure or unmanaged devices.