Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

More Than Compliance: Elevate Your Security Posture with 1Password

You run a business that handles sensitive customer data. To ensure you’re following industry standards, you diligently work to achieve compliance with relevant laws and regulations, such as HIPAA, SOC 2, or GDPR. You invest in the necessary tools, train your staff, and implement the required security policies. After an exhaustive process, you proudly receive your compliance certification.

What's New With Torq: November 2024

As we close out 2024, Torq is rolling out powerful new updates to help security teams start the new year with even greater efficiency and impact. These recent enhancements are designed to streamline operations, boost productivity, and support seamless collaboration. Here’s a look at the latest features set to transform your security operations.

Autumn 2024 Product Releases: What's New at Astra Security

As organizations grow and adopt cloud-native technologies, securing digital infrastructure at scale has become increasingly complex. According to the Cloud Security Alliance, 73% of organizations struggle to secure business-critical cloud applications due to misconfigurations and limited risk visibility. Ransomware alone can cost companies millions, and with the rise in cyber threats, even cyber insurance may not fully protect them from repeated attacks.

ElizaRAT and Beyond: The Evolution of APT36's Malware Arsenal

APT36, also known as Transparent Tribe, is a well-known cyber espionage group attributed to Pakistan. Active since 2013, this advanced persistent threat (APT) group has focused its efforts primarily on Indian government sectors, including defense, education, and key infrastructure. APT36 has demonstrated consistent sophistication in their tactics, evolving their methods to target a wide array of platforms and systems.

Evolution of Scalper Bots Part 5: The Rise of Retail Scalping

Welcome back to our Evolution of Scalper Bots series from the Netacea Threat Intel Center. In our previous blog, we reviewed the early days of anti-bot legislation and its limitations, especially around ticket scalping. Traditional defenses like CAPTCHA quickly became insufficient, which spurred the development of bot management solutions.

3 time-consuming security functions to automate in 2025

Our most recent State of Trust report found that 55 percent of global businesses think security risks for their organization have never been higher. Naturally, to mitigate an increase in risks in today’s complex threat landscape, businesses invest time and money in building a robust cybersecurity posture. But many security initiatives take a lot of time, money, and manual support to implement and maintain. This is a problem for a few reasons. Security budgets are tight.

Exploring the Security Risks of VR and AR

In an era where innovative technologies are emerging left, right, and center, two of the most influential in recent years are experiencing exponential growth. Virtual Reality (VR) and Augmented Reality (AR) are immersive technologies that have now firmly integrated into numerous industries. As these technologies have become more prevalent in our personal and professional lives, they bring with them security and privacy challenges that are hard to overlook.