Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security Guidance from the Front Lines of Cloud Incident Response

In our first-ever Cloud Threat Summit, CrowdStrike’s Senior Vice President of Intelligence and Senior Director of Consulting Services discussed the most common ways adversaries breach the cloud and the steps organizations can take to stay safe.

The definitive guide to compliance with cloud-managed Kubernetes

Kubernetes has become a vital component in cloud-native infrastructure, enabling organizations to deploy and manage containerized applications at scale. However, compliance is crucial to modern infrastructure, especially for businesses that handle sensitive data. Organizations that adopt Kubernetes must thus also be sure to maintain the security of their infrastructure, as well as address compliance requirements to meet regulatory standards.

Kubernetes compliance under GDPR

The General Data Protection Regulation (GDPR) is a data privacy and security regulation in the European Union (EU) that aims to protect individuals’ personal data collected and processed by businesses. The financial penalties for a company that is found to be non-compliant with GDPR can be significant: €20 million or 4% of its annual global revenues.

Guarding Your Transactions: Tackling Rogue Payment Terminals for Payment Acquirers

You’re in your favorite coffee shop, which you’ve frequented for years. The barista knows your order by heart – a medium, iced, sugar-free vanilla latte with soy milk. As you pay for your coffee, you casually chat with the staff about the weather, completely oblivious that you’ve just been the victim of fraud.

ChatGPT Use is Increasing Exponentially in the Enterprise

ChatGPT is a language model that generates fluent, contextually relevant responses to prompts in a conversational fashion. Because it can generate fluent text in multiple languages, it is gaining popularity among enterprise users who are using it to help with the writing process, to explore new topics, and to write code.

Strengthening the Shield: Best Practices for Application Security

In an ever-evolving threat landscape, safeguarding the integrity of applications is a real concern. The consequences of a single security breach can be devastating, leading to data links, financial losses, and irreparable damage to a company’s reputation. Organizations across industries must equip themselves with reasonable defense mechanisms to fortify their applications against malicious actors.

The SecurityManager is getting removed in Java: What that means for you

The Java Development Kit (JDK) library's java.security package is one of the most important packages, yet despite consistent updates, it remains vastly underutilized. In light of the increased emphasis on cybersecurity frameworks, including zero trust, it's imperative for Java developers to become familiar with Java SE's security libraries. As with any other field in information technology, cybersecurity has a capricious nature. After all, it has to keep up with the latest trends in cybercrime.

The Future of Cybersecurity: Unleashing the Power of AI and Threat Intelligence

The rapidly evolving landscape of cybersecurity is witnessing the genesis of new paradigms, redefining the ways we perceive threat detection and response. Traditional approaches to cybersecurity are proving less effective against the sophistication of modern cyber threats. Among the many possible solutions, the integration of Threat Intelligence (TI) and Artificial Intelligence (AI) stands as an impressive contender, aiming to set a new standard in the industry.

The MN Department of Education Gets Hit by MOVEit Breach, Exposing Nearly 95K Students

The Minnesota Department of Education oversees public schools throughout the state and manages data for special programs for the students at these organizations. The organization works with thousands of schools throughout the state and manages some data from students at many of these locations. For those reasons, the MDE is a prime target for data thieves looking to exploit students and their parents, and that's exactly what just happened.