Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Featured Post

Taking a Threat Adapted Approach to Vulnerability Management

As cyber threats continue to grow in complexity and frequency, vulnerability management requires more than just patching systems; it demands a dynamic, threat-adapted approach. As part of Cyber Rhino Threat Week (9-13th of December 2024) which aimed to inform, sharing threat intelligence insights and best practices with our customers, partners and industry ecosystem, we held a session that explored how integrating Threat Intelligence into Vulnerability Management can transform the way organisations prioritise and respond to risks.

Cyber Security Managed Services: Enhance Your Protection with Expert Solutions

Among the most important aspects of building a new digital economy are protecting sensitive digital "boxes" of data, which takes a special kind of work to do well. Cyber security managed services have emerged as a practical solution to this issue, equipped with comprehensive defense mechanisms with professionals' strategies and the latest technologies. Threats evolve, and businesses cannot rely on old security methods anymore.

Understanding Microsoft's CVSS v3.1 Ratings and Severity Scores

Recently, I looked at Microsoft’s assigned CVSS v3.1 scores for Patch Tuesday vulnerabilities alongside the Microsoft assigned severity ratings. I wanted to revisit these numbers and see just how closely CVSS aligns with Microsoft’s opinion of severity. Disclaimer: I’m aware that CVSS v4.0 exists. However, Microsoft has not yet adopted it, and I wanted an apples-to-apples comparison.

Fix Chrome Network Issues with Firewall or Antivirus Settings

Google Chrome Millions of Internet Surfers but Some People. Have a Network Issue One very common reason for these connection issues are incorrect firewall or security settings. For Chrome to function correctly, it is crucial to ensure that it has a proper internet connection. If you are looking for a job, something to have fun or learn, that will save time if you know how to Enable Network Access to Chrome in Firewall or Antivirus settings too.

Stratoshark: Extending Wireshark's legacy into the cloud

There is nothing more exciting (or nerve-wracking) than sharing something you’ve created with the world. Over 25 years ago, we started working on Wireshark. For us, it has always been more than just a piece of software — it’s how we met, how we began our careers, and how we learned to solve problems that once seemed insurmountable.

Introducing 1Password Marketplace: Your hub for all 1Password integrations

Starting now, you can find every supported integration in the 1Password Marketplace, including those for 1Password Extended Access Management, Passage by 1Password, 1Password Developer, and (of course) the world’s most trusted password manager.

How Falco and Wireshark paved the way for Stratoshark

The origins of Sysdig, Falco, and Wireshark can be traced back to one fundamental need: making sense of complex, real-time network traffic for better security and operational insights. Long before containers and cloud security became pressing concerns, Gerald Combs and Loris Degioanni, creators of Wireshark, were solving a different but related problem: how to capture and analyze packets to understand what was happening across networks.