Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Octiga secures France & French speaking distribution with Watsoft

We’re delighted to announce that Octiga, the multi-tenant Microsoft 365 security platform for MSPs, is now available to MSPs and MSSPs operating in France and French speaking African territories. Bordeaux based Watsoft, a French value-added IT distributor, is now Octiga distributor for these regions.

Zero Trust: The Paradox Helping CISOs Enable Their Business

As we reflect on the first half of 2024, it seems to me that two defining features so far have been a litany of significant cyber attacks on companies across every sector, and widespread adoption of AI tools as businesses seek to innovate. At the heart of this storm of cyber threats is the CISO, looking to guide their business safely through potential dangers. Last month, Netskope undertook research examining how CISOs view their role and asking how they’re approaching these challenges.

Observability Meets Security: Tracing that Connection

As outlined in a previous post, OpenTelemetry and Splunk Observability Cloud can provide great visibility when security teams investigate activity in modern environments. In this post, we look at another aspect of this visibility: how you can use traces to see directly into the workings of an application to find a potential threat. Let’s imagine we’re the security analyst, and a message comes across from the Security Operations Center (SOC).

How Attackers Use APIs to Disguise Bots as Games Consoles

Attackers and bot authors are continually evolving their methods, shifting their focus beyond just websites. With websites often having a reasonable level of protection, malicious actors are increasingly targeting less-protected areas, namely APIs, with their bots. This blog post delves into the evolving threat landscape. We’ll focus on how attackers exploit APIs and IoT devices to launch attacks like credential stuffing, using streaming services as a prime example.

Reflecting on KnowBe4's 5th Consecutive TrustRadius Tech Cares Award

For the fifth year in a row, we've been honored with the TrustRadius Tech Cares Award! This recognition is a testament to our unwavering commitment to corporate social responsibility (CSR) and the incredible efforts of our team. What makes this recognition so special is that it celebrates companies that go above and beyond in their CSR programs. At KnowBe4, we've always believed that our responsibility extends far beyond our products and services.

Ultimate Guide to Securing Your Devices: Step-by-Step Tips for Online Safety

Whether you've experienced a security breach, are setting up new devices, or simply enhancing your current security practices, this guide provides a step-by-step walkthrough to help you get back online securely. We've got you covered, from setting up your phone and laptop to tweaking essential security settings and securing your apps.

Chameleon Malware Poses as CRM App

Researchers at ThreatFabric warn that a phishing campaign is distributing the Chameleon Android malware by impersonating a Customer Relationship Management (CRM) app. The campaign is currently targeting users in Canada and Europe, but may expand to other regions. “The naming used for the dropper and the payloads clearly shows that the intended victims of the campaign are hospitality workers and potentially B2C business employees in general,” ThreatFabric says.

Top Reasons to Invest in Aluminum Gates

When it comes to securing your home while maintaining an attractive exterior, aluminum gates are an exceptional choice. Whether you have a modern or traditional home, aluminum fences provide the perfect balance between security and aesthetic appeal. At Aluglobus Fence, we specialize in crafting custom aluminum gates that offer both style and durability, ensuring your home remains safe and welcoming.

Thwarting Cyberattacks: Top In-House Solutions

There is no doubt that the number (and severity) of cyberattacks is on the rise. While the lion's share of attention has been devoted to major breaches that often impact multinational organisations, the fact of the matter is that small- to medium-sized enterprises are also at risk. This is why managers and stakeholders must adopt the latest safety protocols to avoid incidents that might otherwise quickly bring operations to a halt. Let us look at four practical suggestions, and the unique benefits associated with each.