Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Think your attack surface is covered? Let's look at the math.

When it comes to security, organizations often consider themselves well-covered. But in today’s landscape, where cybersecurity threats evolve at breakneck speed, even the most well-prepared teams cannot afford to have testing gaps. The reality is that if your primary strategy for removing security testing gaps is tightening scanning policies or expanding penetration test scope, you are trying to patch a dam with bubble gum. Is your attack surface covered?

#157 - Low noise threat detection with Joshua Neil, Founder at Alpha Level

On this episode of The Cybersecurity Defenders Podcast we talk about low noise threat detection with Joshua Neil, Founder at Alpha Level. Josh is a seasoned expert with over 20 years of experience in developing data-driven solutions to security challenges faced by both the U.S. Government and industry at large. With a deep understanding of enterprise security, they are focused on the fact that perimeter defenses alone aren't enough to prevent attackers from breaching systems.

The Four Transformational Impacts of SASE: Revolutionizing IT Infrastructure with Cato

In today’s fast-paced digital landscape, IT departments face unprecedented challenges. From managing increasingly fragmented infrastructures to ensuring robust security, the demands on IT teams have never been higher. Secure Access Service Edge (SASE) represents a groundbreaking approach to addressing these challenges by converging networking and security into a unified, cloud-native platform. But what makes a true SASE platform so transformative?

Netskope Threat Labs Uncovers New XWorm's Stealthy Techniques

XWorm is a relatively new versatile tool that was discovered in 2022. It enables attackers to carry out a variety of functions, which include accessing sensitive information, gaining remote access, and deploying additional malware. The multifaceted nature of XWorm is appealing to threat actors, as evidenced by its alleged use earlier this year by threat actors such as NullBulge and TA558. Through Netskope Threat Labs hunting efforts, we uncovered XWorm’s latest version in the wild.