Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Tanium Plays Critical Role in Supporting AstraZeneca's Mission to Deliver Life-Changing Medicines

Tanium shares the success story of customer and global pharmaceutical company AstraZeneca in securing over 125,000 endpoints across 125 countries using the Tanium XEM platform. The company consolidated multiple endpoint-management tools to improve agility, efficiency, and visibility across company functions, minimising the risk of a cyber-attack. This allows AstraZeneca leaders and scientists to prioritise their mission to focus on the patient and optimise their results.

Managing Third-Party Cyber Risk in Financial Services

In today's interconnected financial landscape, businesses face increasing risks from third-party vendors, making effective cyber risk management essential. Significant data breach costs and stringent regulatory requirements place further burden on this sector. In response, UpGuard offers a Vendor Risk Management solution to help institutions manage these risks and maintain compliance. Learn more at upguard.com/fsi.

Understanding LLM Evaluation Metrics for Better RAG Performance

In the evolving landscape of artificial intelligence, Large Language Models (LLMs) have emerged as pivotal technology, driving advancements in natural language processing and generation. LLMs are critical in various applications, including chatbots, translation services, and content creation. One powerful application of LLMs is in Retrieval-Augmented Generation (RAG), where the model retrieves relevant documents before generating responses.

Follow the Crypto Part 1: Why Fraud Teams Should Investigate Crypto Transactions

Nowadays, cryptocurrency is a buzzword in society. It’s mostly seen as a high-risk investment or associated with fast profit-making schemes. Despite this, its adoption has surged in recent years, and according to crypto.com, the number of cryptocurrency holders has now hit 580 million. Unfortunately, not all of them hold it for legitimate reasons. We are at a juncture where criminals have the knowledge, services, and tools to channel their illicit profits through cryptocurrencies.

What is Access Control Management and Why Is It Important?

One of the most important aspects of modern cybersecurity is managing access to IT systems and data. Indeed, organizations that lack robust access management are putting a lot on the line, from customer trust to business revenue. This article explains access control management, explores its key components, and provides best practices for implementation.

CVE-2024-6387 OpenSSH RCE vulnerability ("regreSSHion") - Cato Networks impact and analysis

TL; DR – Multiple versions of OpenSSH are vulnerable to remote code execution. There is no working public PoC, and researchers have only been able to exploit the vulnerability under unique lab conditions. Cato Sockets by default do NOT have a publicly exposed SSH interface, it is always recommended to keep Cato Sockets LAN interface exposed only internally and use comprehensive network access controls to manage SSH access.