Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Effective Disaster Recovery Testing: Technical Guide

The distributed and complex nature of Kubernetes applications empowers agility and scalability but also presents unique challenges when it comes to disaster recovery (DR). Handling the interplay of containers, microservices, and persistent volumes requires a robust and well-tested DR plan to ensure business continuity in the face of unexpected disruptions. A poorly tested or inadequate disaster recovery testing strategy can lead to prolonged downtime, data loss, and significant financial setbacks.

Ekran System Enhances Privileged Access Management: New Workforce Password Management Feature

At Ekran System, we constantly enhance the capabilities of our platform, ensuring that organizations have effective and up-to-date tools to protect their critical assets. This time, we are announcing the release of the Workforce Password Management (WPM) feature. This new functionality aims to improve Ekran System’s privileged access management (PAM) capabilities by streamlining password security and management for all users within an organization.

Explore Digital Risk Protection Platforms and Foresiets Key Advantages

Discover the leading digital risk protection platforms that are revolutionizing cybersecurity in 2024. Understanding Digital Risk Protection Digital risk protection refers to the measures and strategies implemented to identify, assess, and mitigate risks in the digital landscape. It encompasses a wide range of activities aimed at safeguarding organizations from threats such as data breaches, cyberattacks, and online fraud.

Navigating GitLab Security: Recent Vulnerabilities (CVE-2024-4835) and Protective Measures

Foresiet, your go-to cybersecurity ally, is here to illuminate recent security updates from GitLab and offer essential guidance to ensure your digital defenses remain resilient against emerging threats. GitLab's Critical Vulnerability Patch and Security Updates.

Top 8 Third-party Risk Assessment Software Options in 2024

The right choice of Third-party risk assessment software will automate risk assessment workflows and boost the efficiency of your Third-Party Risk Management program. This post reviews the top eight contenders in the TPRM and supply chain risk management market to help you make the right choice for your third-party cybersecurity objectives.

Teamwork for Internet security: Rapid response & compliance

Host João Tomé is joined by two guests. First, we have Ranee Bray, Chief of Staff of our Security Team, discussing how we managed programmatically what we called Code Red — several teams were put together to focus in 30 days on strengthening, validating, and remediating a security incident. Credential management, software hardening, vulnerability management, additional alerting, and other areas were also a part of the “Code Red” effort.

Teaser. Half a Century of Connectivity: Celebrating 50 Years of TCP

In May 1974, 50 years ago, Vint Cerf and Bob Kahn made history with their paper on TCP (Transmission Control Protocol) published by @IEEEorg. Here is a teaser of a longer video (and "This Week in Net" episode) coming soon from our protocol experts, Mark Nottingham (Australia), and Lucas Pardue (UK).

Ubuntu 24.04 is Here! Protect your Linux workloads with BDRSuite

Linux recently released Ubuntu 24.04, both Desktop and Server. They bring a lot of new features and enhancements but still require proper protection against failure. First, that includes a proper configuration and then a backup and recovery strategy. Regardless of where Ubuntu 24.04 is installed, Hyper-V, VMware, Proxmox, or bare metal, you must protect it against failure.

Evolving Detection Engineering Capabilities with Breach & Attack Simulation (BAS)

Threat actors are constantly updating their tactics, techniques and procedures (TTPs). In response, security teams must also continue to evolve their ability to detect the latest threats to avoid exploitation of security gaps that can result in costly breaches. This process, called detection engineering, refers to the method of fine-tuning security technologies to better detect malicious activity.

Vulnerabilities in BIG-IP Next Central Manager allows control of managed devices

In May 2024, new vulnerabilities have been identified in BIG-IP Next Central Manager, raising considerable security concerns. This discovery follows closely on the heels of a critical vulnerability revealed in April within Palo Alto's firewalls with enabled GlobalProtect feature, which permitted unauthorized command execution. These recent findings underscore the persistent challenges in ensuring cybersecurity defenses and prompt updates for security solutions themselves.