Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Analysts recognize Fortinet's leadership in SD-WAN

As IT infrastructure evolves, selecting the right partners and solutions means more than just keeping up with technology trends. For IT decision makers, these choices can impact the security and growth of your business operations. Network demands are constantly changing, so finding a solution that can deliver consistent performance and advanced data protection can be key. By focusing on customer success, Fortinet has consistently met the challenges of their customers and has driven innovation.

Chatbot, copilot or agent? A quick guide to enterprise AI tools, including Tines Workbench

As AI continues to mature, we’re beginning to see AI-powered capabilities fall into distinct categories that serve different functions across the enterprise. From help tools like copilots that assist users, to conversational bots providing AI-driven chat support, and efficiency-focused agents that automate complex tasks, these categories reveal the unique ways AI is transforming business operations.

Breaking the Mold: Why Differentiation Matters in the SIEM Market

As I celebrate my first year as head of product management at Graylog, I’ve had the unique privilege of re-immersing myself in the world of Security Information and Event Management (SIEM) from a new perspective. The past year has underscored one critical lesson: staying competitive in SIEM isn’t about adding features; it’s about finding fresh approaches to meet the real needs of security teams.

Reduce time to triage by up to 50% with Corelight's new Guided Triage capability

Security Operations Centers (SOCs) are under immense pressure to ensure no attack goes unnoticed. At Corelight, we’re being approached daily to help bring in network visibility. For many though, visibility isn’t enough. SOCs are already overloaded and Tier 1 Analysts often lack network expertise. Modern network visibility has to be easy to use and designed for maximizing SOC efficiency. For that, we built Guided Triage.

Brivo & Eagle Eye Cloud Security Summit 2024 Recap

The Brivo & Eagle Eye Cloud Security Summit 2024 brought together security leaders, tech enthusiasts, and partners to explore the latest trends in cloud-based security. Discover how Brivo and Eagle Eye are shaping the industry with forward-thinking solutions designed to enhance safety, security, and efficiency.

Inside the MOVEit Breach: How Cl0p and Nam3L3ss Expose Organizations to Ongoing Cyber Threats

In 2023, a critical vulnerability in MOVEit Transfer software (CVE-2023-34362) was weaponized by the Cl0p ransomware group, leading to a substantial leak of sensitive employee data from major global corporations. The flaw in MOVEit allowed attackers to bypass authentication and access secure files, resulting in a far-reaching data breach that impacted various sectors including finance, healthcare, government, and retail. Vulnerability Details and Affected Software Nam3L3ss: Profiling Cl0p Ransomware Data.

IT Security Terms: Regulations, Standards, Controls, Frameworks, and Policies - Where to Start!?

When tasked with the IT security of an organization, it can be easy to get bogged down in particulars and definitions and lose heart before you’ve even begun. With a plethora of terms to learn, details to secure, and moving parts to keep track of, building an effective cybersecurity strategy is no simple task. It requires a great deal of effort, planning, and coordination.

Winter Fuel Payment Scam Targets UK Citizens Via SMS

Scammers have leapt at the opportunity to exploit vulnerable UK residents by sending bogus messages telling them they need to take action to receive help with their winter heating bills. In July, the UK's new Labour Government announced that it was limiting who was eligible for assistance with their winter fuel bills by making eligibility means-tested.

Staying Ahead of the Threat Landscape with Automated Detection and Threat Hunting

Few industries evolve as rapidly as technology—and the world of cybercrime is no exception. While businesses may hesitate to adopt new technologies due to regulatory pressures or security concerns, threat actors in the cybercrime space – who are free from ethical scruples or legal worries – are constantly innovating. This trend has only accelerated with the rise of Generative AI, which has democratized cybercrime by enabling attackers of all skill levels to launch sophisticated attacks.

Nation-State Threat Actors Rely on Social Engineering

A new report from ESET has found that most nation-state threat actors rely on spear phishing as a primary initial access technique. In the second and third quarters of 2024, state-sponsored APTs from China, Russia, Iran, and North Korea used social engineering attacks to compromise their targets. Iranian threat actors continued conducting cyber espionage against countries across the Middle East, Europe, and the US. They also expanded their targeting to hit financial companies in Africa.