Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

German Police Dismantle 47 Criminal Crypto Exchanges in Major Operation

In a significant blow to cybercriminal infrastructure, German law enforcement has successfully dismantled 47 crypto exchanges accused of enabling illegal activities, including money laundering. This operation, dubbed "Final Exchange," was led by the Frankfurt Public Prosecutor’s Office – Central Office for Combating Internet Crime (ZIT) and the Federal Criminal Police Office (BKA).

EP 62 - The Evolution of Identity

In this episode of the Trust Issues podcast, host David Puner sits down with Jeff Reich, Executive Director of the Identity Defined Security Alliance (IDSA), a nonprofit that provides vendor-neutral guidance on identity-centric security strategies to help organizations reduce the risk of identity-related attacks. They explore the evolution of digital identity, discussing how it has transformed from simple identifiers to complex, multifaceted digital identities for both humans and machines.

Announcing "Crafting Secure Software," GitGuardian's Guide to Security by Design!

Exciting news! Our first book, "Crafting Secure Software," is now available. Learn how to embed security throughout the SDLC, mitigate risks, and foster a security culture. Get your copy today and level up your software security game!

Navigating the Privacy Paradox: How Organizations Can Secure Customer Data While Ensuring Convenience

Privacy and convenience have always been at odds, especially regarding digital onboarding or online sign-ups. For modern organizations, striking a balance between the two has become increasingly important. At the same time, a recent report said 53% of customers suggest that they would give up their interaction with a brand if it took longer than two minutes, while as many as 87% expect basic levels of privacy to be met.

Understanding Network Attacks: Types, Trends, and Mitigation Strategies

At a time when digital connectivity is the lifeblood of all business operations, the specter of network attacks is greater than ever. As entities depend on complex network infrastructures, malefactors exploit vulnerabilities with growing sophistication and frequency. Understanding the diverse nature of these threats—from DoS and DDoS attacks to reconnaissance exploits—is crucial for devising effective defense strategies.

Continuous Adaptive Trust: The Key to Agile Cybersecurity

First coined by Gartner in 2021 (subscription required), the term continuous adaptive trust is gaining popularity. This new authentication model might be the solution to constantly evolving threats, strict regulatory requirements, and cloud vulnerabilities. Continuous adaptive trust represents a shift in cybersecurity, moving beyond traditional static access management models to a dynamic, real-time approach that continuously evaluates trust levels based on changing risk factors.

Navigating the SIEM Consolidation: Key Questions

The SIEM market is in flux. Mergers, acquisitions, and vendors leaving the space are creating uncertainty for organizations that rely on SIEMs as the cornerstone of their security operations. If your organization is feeling the ripple effects of this consolidation, it’s time for a SIEM checkup. This means critically examining your current SIEM stack and vendor relationship to ensure they’re still serving your evolving security needs.

New standards for a faster and more private Internet

As the Internet grows, so do the demands for speed and security. At Cloudflare, we’ve spent the last 14 years simplifying the adoption of the latest web technologies, ensuring that our users stay ahead without the complexity. From being the first to offer free SSL certificates through Universal SSL to quickly supporting innovations like TLS 1.3, IPv6, and HTTP/3, we've consistently made it easy for everyone to harness cutting-edge advancements.

Feed me!

Corelight has strengthened the Suricata integration within its Open NDR Platform, empowering customers with a custom ruleset, the Corelight Feed, designed to swiftly detect and help respond to emerging threats. With a new monthly update cycle, Corelight ensures that organizations stay ahead of the latest vulnerabilities and enhance their network security posture effortlessly.