Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How to Build Your Cyber Crystal Ball Using Step-by-Step, Systematically Modeled Threats

2020 was a tough year. As security leaders, we faced new challenges in protecting applications and users who were shifting rapidly off-premises and into the cloud, and our security teams’ workloads grew at an unprecedented rate. In 2021 and 2022, CISOs need to prioritize ensuring that we’re focused on the right things.

US offers $10 million reward in hunt for state-sponsored ransomware attackers

The United States Department of State is offering a reward of up to $10 million for information leading to the identification of anyone, working for a foreign government, who participates in a cybercriminal attack against American critical infrastructure. The news of the reward comes at the same time as the White House announced it was setting up a ransomware task force following a series of high-profile attacks in the United States.

How to Set and Manage Active Directory Password Policy

With cyberattacks exploding around the world, it’s more important than ever for organizations to have a robust password policy. Hackers often gain access to corporate networks through legitimate user or admin credentials, leading to security incidents and compliance failures. In this article, we will explore how to create and maintain a strong and effective Active Directory password policy.

Kubernetes security policy design: 10 critical best practices

In this blog post, I will be looking at 10 best practices for Kubernetes security policy design. Application modernization is a strategic initiative that changes the way enterprises are doing business. The journey requires a significant investment in people, processes, and technology in order to achieve the desired business outcomes of accelerating the pace of innovation, optimizing cost, and improving an enterprise’s overall security posture.

The Global Real-Time Payments Evolution

In June, our team participated in The 2021 Payments Canada Summit, Canada’s premier payments conference. One of the main topics raised at The SUMMIT was the future of payments: why real-time payments (RTP) will be a game-changer for Canadians and the financial industry. The trend towards instant and faster payments is a global one. While Real-time Rail (RTR) is expected to go live in Canada in 2022, other regions have been using RTP for several years.

The Top 14 Free and Open Source SIEM Tools For 2021

Security Information and Event Management (SIEM) is a combination of Security Information Management (SIM) and Security Event Management (SEM). A SIEM solution provides real-time analysis of security alerts generated by applications and networks. SIM is the collection, monitoring and analysis of security-related data such as log files into a central repository for trend analysis.

Demystifying the Hype Around XDR

Extended Detection and Response (XDR) has generated a lot of buzz recently with press, analysts, and even customers. There’s no denying that, at face value, its promise of reduced complexity and cost while increasing detection and response is alluring. As security teams look to modernize their security tooling, they’re also looking for solutions to some of their largest challenges. Is XDR the answer? What is XDR, exactly, and how do you determine if it’s right for your organization?

Ignyte Assurance Platform Receives Grant for Innovation in Cybersecurity Compliance Automation

The Ignyte Assurance Platform team has been awarded $100,000 from the Ohio Third Frontier Technology Validation and Startup Fund (TVSF) to develop and commercialize their cybersecurity and compliance automation software. “We are thrilled to have received this grant and to continue to drive towards our goal of fundamentally improving the way the defense industrial base complies with regulatory obligations like CMMC and FedRAMP,” said Max Aulakh, CEO of Ignyte.