Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Outsmarting Cyber Threats: Etay Maor Unveils the Hacker's Playbook in the Cloud Era

In an era where cyber threats evolve as rapidly as the technology they target, understanding the mindset of those behind the attacks is crucial. This was the central theme of a speech given by Etay Maor, Senior Director of Security Strategy, of Cato Networks at the MSP EXPO 2024 Conference & Exposition in Fort Lauderdale, Florida. Titled, “SASE vs.

Responding to CVE-2024-3094 - Supply chain compromise of XZ Utils

It seems as though responders cannot catch a break when it comes to 0-day vulnerabilities and supply chain compromise avenues. On March 29th, 2024, the Cybersecurity & Infrastructure Security Agency published an alert regarding a supply chain compromise of the XZ Utils package. At time of writing, there is no information regarding exploitation of the vulnerability and follow-on post-compromise activity.

What is the Health Records and Information Privacy Act 2002 (HRIPA)?

The Health Records and Information Privacy Act 2002 (HRIPA) is a comprehensive legislation established to protect the privacy and security of health information in New South Wales (NSW), Australia. This legislative framework shares many similarities with the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule in the United States in their goals to ensure data privacy, security, and handling of health information in the healthcare sector.

Weak Authentication Attacks: 49% report high costs

Cyberattacks on large companies grab the headlines, creating the false impression that only big organizations are targeted by cybercriminals. This misleads smaller companies into believing that they are not potential targets because of their size or low profile. However, threats against small and medium-sized companies have been a cause for concern in recent years. Experts warn that companies with fewer than 100 employees are especially vulnerable to a range of threats.

(Re)Discover the Hidden Value of Single Sign-On

Modern zero trust is an information security model that denies users and devices access to applications, data, networks, and workloads by default. One of the optimal ways to help reduce credential-based attacks with applications is to leverage single sign-on (SSO) as part of your access management strategy. SSO combines simplicity with security by removing friction for users to access applications and reducing the administrative overhead and risks for IT associated with password management.

Trustwave Embarks on an Extended Partnership with Microsoft Copilot for Security

Trustwave today announced it will offer clients expert guidance on implementing and fully leveraging the just-released Microsoft Copilot for Security, a generative AI-powered security solution that helps increase the efficiency and capabilities of defenders to improve security outcomes.

AI - The Good, Bad, and Scary

AI and machine learning (ML) optimizes processes by making recommendations for optimizing productivity, reducing cycles, and maximizing efficiency. AI also optimizes human capital by performing mundane & repetitive tasks 24x7 without the need for rest and minimizing human errors. There are numerous benefits as to how AI can benefit society. As much as AI can propel human progress forward, it can be consequential to our own detriment without proper guidance.

Microsoft Azure Red Hat OpenShift (ARO) and Trilio Data Protection: Uniting Cloud-Native Excellence

With the exponential growth of cloud adoption and the widespread shift to Kubernetes as the de facto orchestration platform, Red Hat OpenShift emerges as a leading solution. Coupled with the robust cloud infrastructure of Microsoft Azure, Red Hat OpenShift on Azure (ARO) is a managed service that offers OpenShift clusters on Microsoft Azure. It is jointly engineered and operated by Microsoft and Red Hat with an integrated support experience.