Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Introducing Graylog 6.1: A Monster Release Just in Time for Halloween

It’s no coincidence that Graylog 6.1 is making its debut right before Halloween. This release is a true behemoth, designed to tackle some of the longest-standing and most challenging issues in Security Event and Information Management (SIEM). Packed with innovations, Graylog 6.1 is here to change the game.

The Importance of Software Testing Types: Emphasizing Regression Testing

Is there any way for a software development team to ensure that applications built by them perform flawlessly after launching to the public? Well, in the world of software development, this is one of the most asked questions. Making sure that the application works without any error when shared with the public is important for any software development company. Luckily, there are comprehensive testing methods that rigorously test the application before its launch.

Long-tail latency: The silent killer of network performance and how DDI Central eliminates it

When it comes to network performance, not all delays are created equal. While average latency gets most of the attention, long-tail latency is often the unseen culprit that silently undermines your network’s efficiency. Before taking a closer look at how a DDI solution helps reduce long-tail latencies and improve efficiency while delivering a seamless network experience, let’s start by learning more about latency.

Creating noise: The emerging obfuscation technique designed to evade email security NLP detection capabilities

Our Threat Intelligence team has observed an emerging obfuscation technique, specifically used to make Natural Language Processing (NLP) detection capabilities less effective. Broadly, malicious actors are adding additional characters, break lines, and legitimate links to the end of a phishing email in an attempt to disguise their malicious payloads amongst the noise and evade NLP detection.

Managing Foreign Government Information (FGI) on a Network

If you’re a firm that works with foreign governments, in addition to certifications like ISO 27001 that you will generally need to achieve, you will also have to have processes in place for handling foreign government information or FGI. It’s not enough that your internal network is classified and access controlled; you need specific handling processes and procedures for managing FGI separately from other confidential or classified data you may have.

Beyond Passwords: Advanced API Authentication Strategies for Enhanced Security

Passwordless authentication for end users is taking the world by storm, offering organizations and individuals alike unprecedented security, user experience, and efficiency benefits. By all indications, the next generation of authentication for end users has finally arrived, sending the password the way of the dodo. Although they don’t get anywhere near the same hype, advanced authentication strategies for APIs are as critical as passwordless authentication for end-users.