Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

The LastPass Data Breach (Event Timeline And Key Lessons)

In August 2022, LastPass suffered a data breach with escalating impact, ultimately resulting in a mass user exodus toward alternative password manager solutions. This post provides an overview of the timeline of events during the LastPass cyber attack and critical lessons to help you avoid suffering a similar fate. Learn how UpGuard streamlines Vendor Risk Management >

Unveiling The Surge: Rising Car Insurance Costs In 2025

Do rising car insurance costs have your wallet feeling the pinch? Between 2020 and 2024, rates shot up by a staggering 54%, leaving many drivers struggling. This blog will break down why premiums keep climbing and what factors influence them. Don't miss out on tips to better understand these changes!

Top 5 Mistakes SAQ A-EP Merchants Are Making in 2025 That Will Knock Them Out of PCI 4.0 Compliance

If you thought PCI DSS 4.0.1 was just a minor tweak to the old requirements, think again. 2025 is here, and it’s clear that many SAQ A-EP merchants are still missing critical steps needed to stay compliant. In fact, we noticed that over 90% of SAQ A-EP merchants aren’t aware that they need to implement new technical measures to address Requirements 6.4.3 and 11.6.1.

5 DevSecOps Checklists to Embrace Advanced Techniques in 2025

If you’re here, you know the basic DevSecOps practices like incorporating proper encryption techniques and embracing the principle of least privilege for access control. You may be entering the realm of advanced DevSecOps maturity, where you function as a highly efficient, collaborative team, with developers embracing secure coding and automated security testing best practices.

Cato CTRL Threat Brief: CVE-2024-49112 and CVE-2024-49113 - Windows LDAP Vulnerabilities ("LDAPBleed" and "LDAPNightmare")

In a world where dozens of CVEs are released every day, there are vulnerabilities, and there are vulnerabilities. The latest Microsoft Windows LDAP (Lightweight Directory Access Protocol) vulnerabilities, which were coined not once but twice (“LDAPBleed” and “LDAPNightmare”), clearly belong to the shortlist of new and dangerous CVEs.

Why Configurations Are the Wrong Thing to Get Wrong

So many times, we look beyond the mark. With our feeds constantly inundated with headline-grabbing news about AI-generated threats, nation states upping their cybercrime game, and sophisticated new forms of malware, we can be tempted to think that the bulk of cyberwarfare is going on "up there" somewhere. In reality, most breaches still originate from unforced errors, and threat actors are just like anybody else – they don't like working harder than they need to.

ISO 27001 Audits: What You Can Expect from Your Auditor

The final step to achieving ISO 27001 certification is passing a final audit of your ISMS. During this process, you will work with an external, third-party auditor to perform a thorough audit of your systems, to evaluate compliance with the guidelines in ISO 27001. The question is, what will that auditor be doing? Do you hand them paperwork and the keys to the building and let them do their thing, or are they more interactive? What can you expect when working with your auditor?

CloudCasa Feature Update December 2024

Ask Our Experts The holiday season is nearly upon us, and 2024 is rapidly drawing to a close. It’s been a very busy year for the CloudCasa team, but we’re pleased to be able to roll out one more feature update before 2025. The whole CloudCasa team would like to wish all of you Happy Holidays and a happy, healthy, and productive new year!

Improving Enterprise Level Visibility Using NDR: Your Complete Guide to Network Security

There was an average major security breach in 95% of organizations in 2023, at an average price of $4.45 million. In today’s rapidly evolving threat landscape, complete visibility of the network is required for businesses. As enterprises increase their digital footprints, monitoring and securing complex network infrastructures become more and more important. With the emergence of sophisticated hackers and regular ransom attacks, organizations must implement the strongest network security solutions.