Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

From deals to DDoS: exploring Cyber Week 2024 Internet trends

In 2024, Thanksgiving (November 28), Black Friday (November 29), and Cyber Monday (December 2) significantly impacted Internet traffic, similar to trends seen in 2023 and previous years. This year, Thanksgiving in the US drove a 20% drop in daily traffic compared to the previous week, with a notable 33% dip at 15:45 ET. In contrast, Black Friday and Cyber Monday drove traffic spikes. But how global is this trend, and do attacks increase during Cyber Week?

Sweet Security Introduces Evolutionary Leap in Cloud Detection and Response, Releasing First Unified Detection & Response Platform

Sweet Security Introduces Evolutionary Leap in Cloud Detection and Response, Releasing First Unified Detection & Response Platform. With Sweet, customers can now unify detection and response for applications, workloads, and cloud infrastructure.

Sysdig and Cribl: Unleash the true power of cloud security data

Cloud security operates on a different paradigm compared to traditional IT security. For example, it involves multiple contextual layers such as cloud services, containers and Kubernetes that require specialized insights. The challenge is even harder when the organization is affected by compliance requirements, and is compounded by the sheer volume of data that becomes a major concern for any organization. Failing to effectively manage it leads to costly inefficiencies and risks.

Access AWS RDS Databases in EKS Using Teleport Machine ID Without Passwords

At Teleport we love modern infrastructure and open-source software, but don't like static credentials and passwords. This created a challenge for us when deploying Temporal, an open-source workflow automation software on EKS: Temporal always requires a password to authenticate to the backend RDS database. To solve this problem, we turned to Teleport Machine & Workload Identity.

Elastic Security on Elastic Cloud Serverless enters general availability

Implement AI-driven security analytics faster on Elastic Cloud Serverless, the easiest way to harness the innovations of Elastic Security Elastic Security on Elastic Cloud Serverless is now generally available. You can launch a deployment in minutes — no prior experience required. Serverless projects are fully managed, minimizing total cost of ownership (TCO) and providing immediate access to the powerful features of the Elastic Search AI Platform and Elastic Security.

CTEM: The Strategic Imperative for Modern Security Operations

The field of IT security has never been more complex or demanding. As organizations race to adopt digital technologies and modernize their infrastructures, they inadvertently create chaos that overwhelms security teams. This chaos is driven by three critical vectors: the rapid expansion of the attack surface, continual changes to existing assets, and the relentless emergence of new security threats.

AWS & 1Password: New integrations help strengthen security

When the tools in your security stack work together, it reduces administration overhead, lowers costs, and increases protection across your organization. That’s why we’ve spent the last year deepening our partnership and product integrations with AWS and other security providers in their ecosystem.

Aikido joins the AWS Partner Network

If you missed it, over the summer months launched our product on the AWS Marketplace with the promise to deliver the fastest “time-to-security” in the industry for new AWS users. We’ve also officially joined the AWS Partner Network (APN) as a validated AWS partner. This means we went through the AWS Foundational Technical Review (FTR). We are FTR-approved* and meet the well-architected best practices enforced by AWS, not to brag. ;) Psst.