Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

KnowBe4 Named a Leader in the Summer 2024 G2 Grid Report for Security Awareness Training

We are thrilled to announce that KnowBe4 has been named a leader in the latest G2 Grid Report that compares security awareness training (SAT) vendors based on user reviews, customer satisfaction, popularity and market presence. Have you ever wanted to peek behind the curtain of Security Awareness Training (SAT) platforms and see which one truly stands out? Well, you don't need to wonder anymore.

Navigating Cloud Security: A Shared Responsibility

Each July, my family and I take a road trip from Kentucky back to my hometown in northwestern Pennsylvania to spend time on Lake Erie. As tradition dictates, we stop along I-71 for coffee at a branch of a certain coffee shop, which also happens to be my former employer as a teen. (Let’s call it Siren Coffee.) This year, we sat waiting in the drive-thru for a drip coffee for a full 10 minutes.

Advanced Network Device Scanning Techniques with Total Network Inventory (TNI)

In network management, the ability to efficiently scan network for devices is crucial for maintaining security, optimizing performance, and ensuring effective asset management. Total Network Inventory (TNI) offers a range of methods to scan network devices.

10 Testing Techniques Every UX/UI Designer Should Know

When designing digital products like websites, applications, software, and the like, one of the most crucial factors to take into account is user experience (UX) and user interface (UI) design. To ensure that their products are user-friendly and satisfy the needs of their intended audience, designers employ testing strategies during the design process. If you're new to the designing process or even have some experience, these ten testing techniques will help you enhance your design process.

DORA and NIS2: How to Ensure Compliance and Enhance Cyber Resilience

In this episode of CISO Conversations: EU Data Regulations, Richard Cassidy, EMEA Field CISO at Rubrik is joined by Jack Poller to discuss the key differences between DORA and NIS2, how they can help enhance resilience against cyber threat, and what steps organizations need to take to ensure compliance.

Next-Gen Vulnerability Assessment: AWS Bedrock Claude in CVE Data Classification

Large language models are fascinating tools for cybersecurity. They can analyze large quantities of text and are excellent for data extraction. One application is researching and analyzing vulnerability data, specifically Common Vulnerabilities and Exposures (CVE) information. As an application security company with roots in open source software vulnerability detection and remediation, the research team at Mend.io found this a particularly relevant area of exploration.

The Hidden Dangers: A Guide to Mobile Security Threats

Mobile technology has changed how government employees work, and hackers have noticed. Mobile-specific threats are on the rise, with hackers often using mobile devices as a backdoor into the agency’s enterprise network. This video, based on a recent mobile threat report by Lookout, highlights four types of mobile threats that agencies need to be aware of, and offers tips for reducing risk.