Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Blogs

Automatic visibility: the key to a more proactive data security program

In today’s rapidly evolving digital landscape, the ability to see, understand, and control data movement within an organization is more critical than ever. Cyberhaven’s customers are turning to our Data Detection and Response (DDR) platform to power their data security programs, moving away from legacy solutions that fail to offer comprehensive visibility. Cyberhaven stands out by providing unmatched insights into data usage and movement across every part of an organization.

The top 5 reasons endpoint agents are essential for data security

Agents can be a pain, we know! From deployment, to managing upgrades, dealing with agent conflicts, and responding to user complaints, we know security teams would rather achieve their objectives without an endpoint agent. But, when it comes to securing your company’s data, there are certain use cases that can only be achieved with an endpoint agent.

Top 10 EdTech Blogs and Trends to Follow in 2024

The world of education technology (EdTech) is constantly evolving, with new tools, platforms, and approaches emerging every year. As an educator or EdTech enthusiast, staying up-to-date with the latest trends and insights is crucial for making informed decisions and providing the best learning experiences for students. From Virtual Team Development Games to immersive simulations, gamification can engage students and make learning more fun and interactive. In this article, I've curated a list of the top 10 EdTech blogs and trends to follow in 2024.

Ransomware in the Global Healthcare Industry

The World Health Organisation (The WHO) hosted a webinar on the 18th of July to discuss the critical importance of cybersecurity in the healthcare sector, highlighting the severity of the situation the industry is currently facing. Healthcare organisations are increasingly relying on digital systems to facilitate their daily workflow, but the prevalence of outdated legacy technology in the sector is rendering it vulnerable to cyber-attacks with severe consequences.

The Power of Combining a Modular Security Data Lake with an XDR

The 2024 Global Digital Trust Insights survey from PwC reports that 36% of businesses have experienced a data breach that cost more than $1 million to remediate. Cyber threats are clearly on the rise and in today’s volatile threat environment, it is a matter of when - not if - a cybersecurity incident will occur. Digital adversaries are becoming more sophisticated and relying on weak links to exploit company applications and infrastructure.

Top 5 reasons to fuzz embedded systems

One of the most effective security testing methods for embedded systems is fuzz testing. It’s the fastest way to identify memory corruption errors and their root cause. It enables a shift-left testing approach, recommended by many industry standards, and reaches up to 100% code coverage. Read on for the details.

The Importance of Firewall Logs

A firewall is a crucial network security element that forms a barrier between an internal network (e.g. a company's intranet) and external networks (e.g. the Internet). A firewall's main objective is to regulate and monitor incoming and outgoing network traffic based on prescribed rules. This helps prevent unauthorized access, safeguards sensitive data, and mitigates security risks.

Ubuntu 20.04 vs 22.04: Comparing features and performance

Jump to Tutorial Ubuntu is a popular Linux distribution that has been adopted by many system administrators, developers, or everyday users who are searching for a robust and open-source operating system. Each version of Ubuntu brings new features, improvements and sometimes there are certain changes in system requirements.

AI Treason: The Enemy Within

tl;dr: Large language models (LLMs) are highly susceptible to manipulation, and, as such, they must be treated as potential attackers in the system. LLMs have become extremely popular and serve many functions in our daily lives. Every reputable software company integrates artificial intelligence (AI) into its products, and stock market discussions frequently highlight the importance of GPUs. Even conversations with your mother might include concerns about AI risks.

How Much Information Can Someone Get From Your Email Address?

Your email address can reveal a substantial amount of personal information including your full name, phone number, home address, place of work, social media profiles and other online accounts. Keep reading to learn what information someone can get from your email address, whether your identity can be stolen and how to keep your email address safe.