Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

The 2024 Elastic Global Threat Report: Forecasts and recommendations

Yesterday, Elastic Security Labs released the 2024 Elastic Global Threat Report, a comprehensive look at more than 1 billion data points from Elastic’s unique telemetry. The report provides insights into the methods, techniques, and trends of threat actors from the perspective of defenders — giving crucial insights for security teams to prioritize and improve their security posture.

QR Code Security: How Businesses Can Keep Customers Safe

Do you want to make sure your QR code security practices are keeping your business and customers safe? If so, you're in the right place! QR codes (Quick Response codes) are barcodes that store data for people who scan them with their device, usually a smartphone. QR codes have many great uses, such as helping customers learn more about your products and making it easy for them to download your app.

Must-Know Strategies for DORA Compliance

In this episode of CISO Conversations: EU Data Regulations, Richard Cassidy, EMEA Field CISO at Rubrik, is joined by Anna Delaney, Director of Productions at Information Security Media Group (ISMG), to explore why the Digital Operational Resilience Act (DORA) makes operational resilience a priority for financial services organizations. They discuss how DORA will impact your financial institution, how to best prepare for DORA and improve operational resilience, and how to increase oversight and accountability of third parties in the supply chain.

Complying with the EU's New AI Act: A Guide to Staying Ahead

Artificial intelligence (AI) is increasingly embedded in modern organisations—from standalone generative AI apps to AI copilots in popular SaaS platforms, and the integration of self-hosted or public large language models (LLMs) in private applications tailored to specific business needs. The recently introduced EU AI Act sets out to regulate AI development and usage, ensuring that AI systems are safe, ethical, and respect fundamental rights.

How to detect more bugs in AUTOSAR Applications and enable SiL testing by using a simulator

Testing Classic AUTOSAR applications has long been a significant challenge due to the reliance on hardware-in-the-loop (HiL) setups, which are costly, complex, and hard to scale. Code Intelligence’s new lightweight AUTOSAR simulator revolutionizes this process by enabling entire AUTOSAR applications to run on x86 Linux systems, thus facilitating software-in-the-loop (SiL) testing.

CrowdStrike Empowers DevSecOps Teams to Strengthen and Streamline Cloud Security

Support for cloud security posture management (CSPM) misconfigurations: Our enhanced CSPM tools vigilantly monitor cloud infrastructures for misconfigurations, compliance violation and security gaps, providing complete visibility into security posture early in the development cycle and saving SecOps teams time.

How Cloudflare auto-mitigated world record 3.8 Tbps DDoS attack

Since early September, Cloudflare's DDoS protection systems have been combating a month-long campaign of hyper-volumetric L3/4 DDoS attacks. Cloudflare’s defenses mitigated over one hundred hyper-volumetric L3/4 DDoS attacks throughout the month, with many exceeding 2 billion packets per second (Bpps) and 3 terabits per second (Tbps). The largest attack peaked 3.8 Tbps — the largest ever disclosed publicly by any organization. Detection and mitigation was fully autonomous.

Enhanced Threat Exposure Management with Seemplicity and OX Security

Managing vulnerabilities across multiple domains, and especially application security, is a challenging task for enterprise organizations. Security teams often find themselves grappling with fragmented tools and data, leading to inefficiencies and potential blind spots. Seemplicity’s recent integration with Ox Security addresses this issue directly, offering a unified approach to vulnerability management that bridges the gap between security, development, and operations teams.