Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Root Detection Techniques

Phone manufacturers and mobile network operators often implement stringent software restrictions for security reasons. However, these constraints can be circumvented by rooting your Android phone. Rooting is the process of gaining access to more administrative-level controls on an Android device. Despite its benefits, attackers often use rooting to target sensitive user and business data. According to security experts, 36 out of 1000 Android devices are rooted globally.

CrowdStrike Delivers Adversary-Focused, Platform Approach to CNAPP and Cloud Security

Cloud-based services have revolutionized business processes and emerged as the backbone of the modern enterprise. According to analyst firm Gartner®, “more than 85% of organizations will embrace a cloud-first principle by 2025 and will not be able to fully execute on their digital strategies without the use of cloud-native architectures and technologies.”

Top 6 Reasons to Choose CloudCasa over Kasten by Veeam

If you are considering Kasten today and wondering what alternatives exist for Kubernetes backup, you are at the right place where we will make our case for why CloudCasa should be your choice instead. Kasten K10 is one of the first products built to address the data protection gap in Kubernetes environments. Veeam is a market leader in data protection, and they acquired Kasten in 2021. Together, Kasten by Veeam presents a strong combination of innovation and go-to-market chops.

Answered: Your Most Burning Questions About Planning And Operationalizing MITRE ATT&CK

Hey There, Recently we ran a webinar ( English | German | French) in which we showed how Security Operations Teams can plan based on the MITRE ATT&CK Navigator, a threat-centric defense strategy. We also demonstrated how to operationalize it with content from the Splunk Security Essentials app via Splunk Enterprise Security. We received so many questions from attendees during the session that we weren’t able answer them all.

What is a Cyber Crisis Simulation?

There are a variety of methods that an organization can implement to test its ability to withstand a cyberattack or another type of catastrophic situation. One such technique is to conduct a crisis simulation. The term crisis simulation is somewhat generic and seems awfully similar to other types of exercises organizations run to test their level of preparedness.

Rethinking Privileged Access Management for Cloud and Cloud-Native Environments

SSH was designed in 1995, LDAP was initially developed in 1993, and role-based access control was introduced in 1992. The concept of least privilege was introduced in 1975. With all of these existing technologies, when are modern privileged access management solutions necessary? This is a common question asked when we pitch the idea of modern privileged access management (PAM).

Automated Threat Hunting: A Closer Look

Proactively finding and eliminating advanced threats through threat hunting is a growing necessity for many organizations, yet few have enough resources or skilled employees to do it effectively. For those who do have an active threat hunting program, the process is often manual and time consuming. With cloud security automation, however, you can implement rules that automatically adjust your security policies based on the latest threat data.

2022 Container Security Trends Report: Exploring ownership, education, expertise, and more

With dependence on containers growing more every year, developers need the best container security solutions they can find, and those solutions have to integrate seamlessly into existing development workflows. Snyk’s partnership with Sysdig has helped us strengthen our commitment to building tools for container security, and growing those tools to meet the evolving needs of developers. And as a developer-first organization, we truly value feedback that comes right from developers themselves.

Vector Capital Acquires Majority Ownership of WatchGuard Technologies

Over the last 25 years, WatchGuard has driven consistent innovation and growth. In recent years that growth accelerated significantly—fueled by our aggressive portfolio expansion and our ability to build and retain an enviable channel community—as we united behind the mission of making enterprise-grade security accessible to all customers via Managed Service Providers (MSPs).