Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

44% of U.S. Organizations Experienced One or More Ransomware Attacks in the Last Year

As ransomware becomes more pervasive, new data provides insight into how well organizations are responding and the attack vector being used most. We hear a lot about ransomware attacks, but I’m not seeing data about how well organizations fared, so I was glad to see GetApp’s 2024 Data Security report. According to the report, nearly half of U.S.

KnowBe4 Named a Leader in the Fall 2024 G2 Grid Report for Security Awareness Training

We are thrilled to announce that KnowBe4 has been named a leader in the latest G2 Grid Report that compares security awareness training (SAT) vendors based on user reviews, customer satisfaction, popularity and market presence. Have you ever wanted to peek behind the curtain of Security Awareness Training (SAT) platforms and see which one truly stands out? Well, you don't need to wonder anymore.

Top Strategies for Preventing Accidental Data Shares in Real Time

In today’s cybersecurity landscape, it’s not enough to guard against external threats. Employees have access to so much sensitive information and so many ways to share it that it’s easier than ever to leak data accidentally. These accidental data shares can jeopardize your organization’s compliance standing, expose your systems to threat actors, and cost you business. Everyone makes mistakes.

Data Security Best Practices: 7 Tips to Crush Bad Actors

In today’s hyper-connected world, it’s becoming increasingly difficult to ensure your data is protected. With users accessing networks from multiple locations, data passing through unpredictable endpoints, and a rampant increase in cybercrime, establishing and maintaining data security best practices has never been more important. According to the Identity Theft Resource Center, there were 2,365 cyber attacks in 2023, a 72% increase over 2021.

Best Penetration Testing Tools for Enterprises

Penetration testing tools are necessary for enterprises that want to protect their applications from real-world cyber attacks. These tools identify vulnerabilities that could lead to breaches, like the 2017 Equifax data breach. These specialized tools help identify gaps in software security posture by simulating real-world attacks that vulnerability assessments may not fully expose.

Streamlining security investigations with real-time enrichment of Corelight Open NDR and SentinelOne Singularity

In today’s threat landscape, security teams face mounting challenges in maintaining a robust security posture. Legacy tools often fall short of defending against increasingly sophisticated adversaries, especially with the complexity of modern, multi-cloud environments. Corelight’s latest integration with the SentinelOne Singularity Platform brings a fresh approach to overcoming these challenges, unifying network and endpoint visibility while simplifying and accelerating threat investigations.

Cybersecurity Sessions S03E03 - Stuart Seymour (Group CISO, Virgin Media O2)

In this insightful episode, Stuart Seymour, Group CISO and CSO at Virgin Media O2, joins Andrew Ash (CISO, Netacea) to discuss how his experience as a British Army Captain shaped his unique leadership style in cybersecurity. Stuart also shares his passion for building diverse, neurodiverse teams, drawing from his own experience with dyslexia. He dives into the growing importance of AI in SOCs and the complex challenges of navigating global cybersecurity regulations. A must-listen for anyone looking to understand the evolving role of a CISO in today's landscape.

Intelligent Privilege Controls: A Quick Guide to Secure Every Identity

Security used to be simpler. Employees, servers and applications were on site. IT admins were the only privileged identities you had to secure, and a strong security perimeter helped to keep all the bad guys out. Times have changed. Attackers targeting identities is not new. What’s different is the dramatic increase in the quantities and types of identities, attacks and environments.

Azure DevOps Backup Best Practices

Having a market share of 8.81 % and competing with other version control platforms, like GitHub, Bitbucket, and GitLab, Azure DevOps can already boast of more than 700M Azure users. That’s not surprising, as the service offers a variety of things from planning to development and operations. Thus, containing critical DevOps information, Azure DevOps becomes a critical hub of your data. So, in this case, is the question “Why back up Azure DevOps” the correct one?

It's 2024 and the API Breaches Keep Coming

APIs are built expressly to share a company’s most valuable data and services. This makes them a lucrative target for bad actors. We’ve already hit the tipping point — APIs are now THE way in. Salt Security’s 2024 State of API Security Report revealed that the count of APIs is increasing, having gone up by 167% in the past year. 95% of respondents have experienced security problems in production APIs, with 23% having experienced a breach.