Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Customizable Roles and Permission in ASPM Platforms

The rising adoption of Application Security Posture Management (ASPM) platforms by organizations to manage their application security from a single platform has led to new requirements, especially in large organizations with diverse workforces and varied responsibilities. While centralization through ASPM enhances visibility, it also creates a single point of failure if not implemented correctly. Therefore, granular access controls are crucial to prevent unauthorized access.

Leveraging Generative AI with DevSecOps for Enhanced Security

AI has made good on its promise to deliver value across industries: 77% of senior business leaders surveyed in late 2024 reported gaining a competitive advantage from AI technologies. While AI tools allow developers to build and ship software more efficiently than ever, they also entail risk, as AI-generated code can contain vulnerabilities just like developer-written code. To enable speed and security, DevSecOps teams can adopt tools to integrate security tasks into developer workflows.

EP 2 - Dispatch From Retail's Frontline: Building Cyber Resilience

In this episode of Security Matters, we dive into the world of retail technology and cybersecurity. Imagine a bustling retail chain during its busiest shopping season, only to be disrupted by a cyberattack. Our guest, Jason James, Chief Information Officer (CIO) at Aptos Retail, shares his insights with host David Puner on how to stay ahead of these threats.

Fake CAPTCHAs, Malicious PDFs, SEO Traps Leveraged for User Manual Searches

On February 12, 2025, Netskope Threat Labs reported a widespread phishing campaign using fake CAPTCHA images via Webflow CDN to trick victims searching for PDF documents on search engines. These PDF files lead to phishing sites designed to pilfer victims’ credit card and personal information. As we hunted for similar phishing campaigns, we discovered many more phishing PDF files with fake CAPTCHAs distributed across multiple domains.

Introducing Sysdig Threat Management: Combating threats in cloud security

Cloud security teams are often faced with an onslaught of noise from their detection tooling, making it nearly impossible to distinguish truly malicious threats from benign behaviors. Many threats will go uninvestigated simply because there aren’t enough analysts for the sheer amount of alerts, leaving organizations exposed to potential breaches.

Inline response actions: Streamlining incident response in the cloud

Threat response is a cornerstone of cloud security, but its roots lie in the early days of antivirus software. Back then, responding to threats was fairly linear and straightforward — stop the malicious process, quarantine it, remove or delete if necessary, and move on. However, modern cloud environments have revolutionized how threats operate, making it clear just how much the game has changed.

Phishing Attack Leads to Lateral Movement in Just 48 Minutes

Researchers at ReliaQuest have published a report on a phishing breach in the manufacturing sector that went from initial access to lateral movement in just 48 minutes. The attackers began by swamping users with spam emails, then posed as tech support and offered assistance in stopping the flood of spam. “To gain entry into the organization’s network, the threat actor used social engineering and end-user manipulation,” the researchers write.

KnowBe4 Named #1 Security Product and #2 Overall Software Product in G2's 2025 Best Software Awards

KnowBe4 has been recognized in G2’s 2025 Best Software Awards, earning the top spot as the Security Product and ranking Overall Software Product. This prestigious recognition from G2, the world’s largest and most trusted software marketplace, is a testament to the impact our Security Awareness Training (SAT) product has on organizations worldwide.

Security Misconfigurations: A Deep Dive

Managing configurations in a complex environment can be like playing a game of digital Jenga. Turning off one port to protect an application can undermine the service of a connected device. Writing an overly conservative firewall configuration can prevent remote workforce members from accessing an application that’s critical to getting their work done.