Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

Non-repudiation: Your Virtual Shield in Cybersecurity

In the digital world, where countless users communicate, share data, and engage in diverse activities, determining the origin and actions behind these interactions can be quite challenging. This is where non-repudiation steps in. Coupling other security factors, such as delivery proof, identity verification, and a digital signature, creates non-repudiation. This guarantees that the parties involved in the transmission are unable to renounce the execution of an action.

Greening the Digital Frontier: Sustainable Practices for Modern Businesses

The push towards digital transformation has significantly improved efficiency, productivity, and accessibility for businesses globally. However, the environmental footprint of digital operations has increasingly become a focus for concern. As companies continue to leverage digital technologies, the need for integrating sustainable practices into their operations has never been more critical. This article delves into the environmental impact of digitalisation and outlines practical strategies for businesses aiming to achieve sustainability in the digital age.

Five worthy reads : Securing the connected world thru cybersecurity in the IoT era

Five worthy reads is a regular column on five noteworthy items we have discovered while researching trending and timeless topics. This week, we will be discussing the challenges of cybersecurity in the IoT era and how it can be secured. The Internet of Things (IoT) has revolutionized the way we live and work, with hundreds of connected devices now integrating into our daily lives. However, this rapid expansion of IoT has also brought new cybersecurity challenges.

Email Deliverability: Finding and Fixing Issues with GlockApps

Are your email campaigns not producing the expected results? Do you have disappointingly low open rates, or worse, are your emails getting lost in the spam folder? If so, you're not alone because almost every marketer faces email deliverability issues. But there is good news, and it is that they're not impossible to overcome. In this article, we'll cover the ins and outs of finding and fixing email deliverability issues so that your messages are received by your audience and read on time.

Meet EO 14028 requirements with Datadog Log Management, Cloud Workload Security, and Cloud SIEM

As of August 2023, only 3 out of 23 US government agencies were compliant with Office of Management and Budget (OMB) requirements for log management and security observability. These requirements are outlined in M-21-31, a 2021 memorandum that was issued following Executive Order 14028 on improving national cybersecurity. Until all of these agencies implement the new requirements, the federal government’s ability to fully detect, investigate, and remediate cybersecurity threats will be constrained.

Dual Defenses: 9 Reasons Why Open NDR Is Essential Alongside NGFW

Securing a network against the myriad of evolving cyber threats requires more than just a robust firewall or endpoint protection platform; it demands a multifaceted approach. Corelight’s Open Network Detection and Response (NDR) Platform complements and significantly enhances the effectiveness of next-generation firewalls (NGFWs). Here are 9 reasons why adding Corelight to your cybersecurity arsenal, alongside existing NGFWs, is not just an upgrade but a strategic necessity.

Email-Based Cyber Attacks Increase 222% as Phishing Dominates as the Top Vector

Analysis of the second half of 2023 shows attackers are getting more aggressive with email-based phishing attacks in both frequency and execution. Until there’s a catch-all way to stop malicious emails from being an effective means of initial attack, phishing will continue to grow as the primary initial attack vector for cybercriminals.

Cybercriminals Sent 1.76 Billion Social Media Phishing Emails in 2023

As social media phishing reaches new heights, new data reviewing 2023 shows a massive effort by cybercriminals to leverage impersonation of social media brands. Cybercriminals are no longer just targeting your corporate network. Due to the rise of the cybercrime economy, there are a growing number of cybercriminal gangs strictly going after initial access (that can be sold to other cybercriminals).