Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

CloudCasa Helps Overcome Day 2 Kubernetes Challenges and Integrates with the 3 Major Cloud Providers

In this episode of TFiR Let’s Talk, Swapnil Bhartiya sits down with Sathya Sankaran, COO of Catalogic and GM of CloudCasa, to discuss in-depth how CloudCasa is supporting backup for the three major cloud providers − Azure Kubernetes Service (AKS), Amazon Elastic Kubernetes Service (EKS), and Google Kubernetes Engine (GKE) − and the data protection challenges they are addressing.

Flywheel Accelerates Deployments and Provides Agile, Compliant Support for Biomedical Researchers using Teleport

As companies increasingly move to remote workforces, the need for secure and rapid offboarding has never been greater. Flywheel, a digital agency that specializes in healthcare and life sciences, has found great success using Teleport to streamline its offboarding process. Flywheel had been using a traditional VPN solution to grant access to customer environments, but found the process to be slow and cumbersome.

How important is cryptography in network security?

“Please enter the one-time-password (OTP) that has been sent to your registered mobile number.” The next time you see a statement like this remember that there is a definite reason behind it. IT administrators utilize a variety of security methods, including hardware and software solutions, to secure network data against unauthorized access and other threats. These mechanisms are a preventive measure that ensure network security.

Open Source Intelligence

The term “open source” refers in particular to records this is publically available. A huge part of the internet cannot be found using major search engines. This is called as “Deep Web”. Deep Web is a mass of websites, databases, files, and more that cannot be indexed by Google, Bing, Yahoo, or any other search engine. Despite this, much of the content of the dark web can be considered open source because it is easily available to the public.

Top 10 Data Breaches of 2022 (So Far...)

As we are in the midst of the October Cybersecurity Awareness Month of 2022, all of us need to be more cautious than ever regarding the risks surrounding an increasingly complex and lethal cyber threat landscape. Appknox takes this opportunity to join forces with cybersecurity champions and stakeholders to raise awareness about mobile app security. Our aim is to empower everyone to protect their personal data from cybercrime.

Automated phishing triage with Material and Tines

At Tines, we understand there’s no such thing as a universal workflow. While there are often some standard best practices, whether carrying out a workflow manually or automating it, every team has a unique approach and set of tools to solve challenges. This is especially true for security teams, who constantly have to evolve their processes and infrastructure to stay ahead of cyber attackers in today’s rapidly changing threat landscape.

10 Tips to Mitigate Your SaaS Cybersecurity Risks

Convenience. This is the key reason that businesses rely on SaaS applications. Companies worldwide were using an average number of 110 SaaS applications. All those applications have become one of the most severe security challenges. A report states that 40% of SaaS assets are vulnerable to data leaks due to poor management. SaaS-based apps are prone to massive threats, including ransomware, phishing, and malware. Even minor security incidents have damaging effects on your enterprise.

"Easy" button for cloud NDR visibility

As organizations continue to rapidly adopt cloud services, they struggle to expand network detection and response (NDR) capabilities to their hybrid and multi-cloud environments. Network visibility is critical for security operations center (SOC) teams to secure their cloud environments and ensure they can elevate threat detection and incident investigation capabilities. However, traditional NDR solutions require management, configuration and often lack the security context needed.