Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

What Is Payment Tokenization and What Will It Mean for Information Security?

Every time your customers make an online payment, they trust that their sensitive data won’t end up in the wrong hands. But what if it did? With cybercriminals using AI and launching direct attacks on payment systems, securing financial transactions has become a high-stakes challenge for businesses worldwide. In the first half of 2023, around 48.77 billion card payments were made with EU/EEA-issued cards, of which an average of 7.31 million were fraudulent.

'Tis the Season: How to Strengthen Your Defenses Against Holiday Hacking

For an enterprise business, the holidays can be a mixed bag. On the one hand, depending on your industry, you’re either winding down or doing the most business you’ll do all year. On the other, you’re especially vulnerable to holiday hacking attempts. Your customer data makes your organization an attractive target at a time when employee vacation time and office closures mean you have fewer employees to guard against holiday hackers.

Seasonal Phishing Scams: Protect Your Enterprise During the Holiday Spike

The holidays are a hectic time. It’s often the busiest sales period of the year, generating the lion’s share of revenue for many organizations. At the same time, employees are wrapping up their big projects before the office closes for the winter break. Meanwhile, everyone’s trying to work around increasingly packed schedules while caring for their personal and family needs.

All I Want For The Holidays Is.... Powerpwn

In the ever-evolving landscape of cybersecurity, the use of open-source red teaming tools has become indispensable. These tools not only raise awareness about potential vulnerabilities but also encourage security teams to think like attackers so they can begin the process of protecting their organizations against them. By simulating real-world attack scenarios, organizations can better understand their security posture and proactively address weaknesses.

Enhancing Your Teleport Experience with Kenneth Roraback

Join a dynamic workshop session from Teleport Connect where users and team members collaborate to shape the future of Teleport. This interactive session captures real user feedback about current frustrations and desired features for 2025 and beyond, using a structured brainstorming approach with color-coded post-its and group discussions. In this session, you'll see: Key themes that emerged: Chapters.

Policy as Code: The Future of Authorization & Access Control - Sasha Klizhentas at Teleport Connect

Join Sasha Klizhentas, CTO of Teleport, as he discusses the critical challenges in authorization and access control, and introduces an innovative approach using policy as code. Learn how this new methodology can help prevent misconfigurations that lead to data breaches, and see a live demo of Teleport's new policy as code features with Dave Sudia. In this talk, you'll discover.

Detect malicious activity in Google Workspace apps with Datadog Cloud SIEM

Google Workspace is a popular productivity suite, and its broad collection of apps (such as Gmail, Drive, Calendar, and Docs) can give attackers a central point of entry for accessing sensitive and valuable data if they compromise an account. Learning how to identify malicious activity in your Workspace environment enables you to stop threats before they become more serious. In this post, we’ll look at a few ways attackers gain access to and take advantage of Google Workspace.