Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Introducing Forescout XDR: Putting the X, D and R Back in XDR

According to a Mandiant survey of 1,350 global business and IT leaders, when trying to secure their networks against cyber threats, nearly all respondents (96%) believe it’s important to understand the threat actors targeting their organizations. That’s hardly a surprise. But then there’s this finding: 79% of respondents say that most of the time, they make decisions about cyberattacks without insights into who could be targeting their organization.

Passkeys and the future of authentication: Q&A with Andrew Shikiar, CMO of FIDO Alliance

What are passkeys? How do they fit into a passwordless future? Why is user experience the key to adoption for passwordless? These are just a few of the questions people have for the FIDO Alliance – an open industry association that wants to reduce the world’s reliance on passwords.

Instantly scalable dynamic application security testing

Reduce complexity, increase scalability, and improve cost-efficiency while providing absolute coverage with DAST solution WhiteHat Dynamic. Despite the proliferation of application security testing (AST) tools in use today, most organizations knowingly or unknowingly push vulnerable code to production.

Learn OPA for Kubernetes Admission Control with Styra Academy

As enterprises build and run cloud-native applications on Kubernetes, platform engineering teams are responsible for empowering dozens, hundreds or even thousands of developers to rapidly configure the right infrastructure resources to run mission-critical applications. At the same time, today’s complex threat landscape and strict regulatory environment make it increasingly difficult for developers to configure secure and compliant infrastructure.

Trustwave Government Solutions Named Palo Alto Networks Cortex XMDR Specialization Partner

Trustwave Government Solutions (TGS), a wholly-owned subsidiary of Trustwave Holdings, Inc., which supports the public sector with market-leading Managed Detection and Response (MDR) cybersecurity services, has achieved Palo Alto Networks Cortex eXtended Managed Detection and Response (XMDR) Specialization.

BYOD Increases Mobile Phishing Rates, and the Risks Have Never Been Higher

Stolen employee login credentials are one of the most effective ways for bad actors to infiltrate your organization’s infrastructure. Once they have the login information of one of your accounts in hand, it becomes much easier for them to bypass security measures and gain access to your sensitive data. So how do attackers get those login credentials? The answer in many cases is mobile phishing.

PyPI Packages Used to Deliver Python Remote Access Tools

As part of a project to obtain more awareness of initial attack vectors outside of the common phishing and web application exploitation, Kroll’s Cyber Threat Intelligence team has developed a tool to enable the enhanced monitoring of the Python Package Index (PyPI) to find and obtain malicious packages that are added to it.

MITRE ATT&CK and D3FEND for Cloud and Containers

MITRE ATT&CK and MITRE D3FEND are both frameworks developed by the non-profit organization MITRE, but they serve different purposes. If you are new to the MITRE ATT&CK framework and would like to brush up on some of the concepts first, we created a Learn Cloud Native article to help you on your journey. If you want to go further, here’s how Falco’s Cloudtrail rules align with MITRE ATT&CK.

What Keeps Cybersecurity Leaders Up At Night: A Global Perspective

Our research shows that 48% of security leaders are worried about a cloud breach, and they have reason to worry if their cloud security isn’t ready for potential threats. Join us for a LinkedIn Live as we dig into the data from our “Global Uncertainty” survey and offer up next steps for organizations to ease their cybersecurity concerns and start securing their systems.