Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Materially Missing the Mark With Cyber Event Disclosure Rules

A little over a year ago, the US SEC’s rules on cybersecurity incident disclosures were enacted, mandating that all publicly traded companies report material cyber events within four days after they had been determined as such unless exempted for national security or safety reasons. The rationale behind these rulings was that they would provide investors and relevant stakeholders with the information necessary to make more informed decisions, thereby leading to more realistically priced options.

Top 5 Strategies to Reduce Dwell Time with XDR: Accelerating Threat Detection and Response

Cyber adversaries operate with one goal in mind—stealth. The longer they go undetected in an environment, the more damage they can cause. Dwell time is the total amount of time that a threat remains unnoticed in a system, from initial compromise to discovery. According to the most recent threat reports, the average dwell time for undetected breaches has reduced but remains at 10-15 days, providing attackers enough time to exfiltrate data, launch ransomware, or establish persistent access.

The Aurora Endpoint Security Difference: Ushering in a New Dawn for Cybersecurity

Today, Arctic Wolf successfully completed the acquisition of BlackBerry’s Cylance endpoint security assets. With this acquisition, we are thrilled to welcome hundreds of new partners and thousands of customers to The Pack. Additionally, we are excited to welcome almost 400 new employees who will join Arctic Wolf offices around the globe.

How insurance companies discover, classify, and act on sensitive data risks with Datadog

Every day, insurance companies manage vast amounts of sensitive data, including medical records, financial information, and personal identifiers—all of which are processed and stored across various services, applications, and cloud resources. The types of sensitive data that these companies collect has become more complex and nuanced, with varying requirements for protection.

DeepSeek DDoS: Why AI Needs Machine Identity Security

Imagine a sleek, high-tech sports car racing downhill without brakes. Now, imagine that car is actually the AI driving your business. Powerful yet precariously close to catastrophe. That’s why, as we accelerate AI adoption, including AI agents, we can’t afford to overlook security guardrails. This fact was front and center during the recent “large-scale cyberattack” on DeepSeek, a strategic open-source AI player from China that’s been disrupting the global AI space.

LimaCharlie's MSSP Partner Program

LimaCharlie is a different kind of security vendor—and this gives managed security services providers (MSSPs) a competitive advantage unlike anything else in the industry. For MSSP users that want to deepen their partnership with LimaCharlie, we’ve developed a special MSSP Partner Program. Here’s what it’s all about.

Securing Critical Infrastructure: How KeeperPAM's Zero-Trust Architecture Protects Industrial Control Systems

The Cybersecurity and Infrastructure Security Agency (CISA) has recognized that Industrial Control Systems (ICS) and Operational Technology (OT) environments represent one of the largest threats to American critical infrastructure. The increasing convergence of IT and OT systems, combined with the rise of ransomware attacks targeting critical infrastructure and the growing sophistication of nation-state threats, has created unprecedented security challenges.

Building vs. Buying: Navigating the Data Privacy Vault Dilemma

In today’s AI-driven world, where data powers everything from personalized recommendations to advanced business analytics, safeguarding sensitive information is more critical than ever. As data breaches and regulatory requirements grow more complex, organizations face mounting pressure to protect personal and confidential information with a data privacy vault that ensures security and compliance.

Jit + Cyera: A Unified Approach to Protecting Your Most Sensitive Data

Today, Jit and Cyera are thrilled to announce an integration that will help address one of the most pressing challenges in cybersecurity: prioritizing code and cloud vulnerabilities according to the actual risk they introduce. Put simply, this integration will make it easy for security teams to pinpoint vulnerabilities (detected by Jit) that impact the security of your most sensitive data (monitored by Cyera). As a result, security teams.