Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

7 SIEM Configurations To Improve Your Time to Value

Whether you’re an Apple fan or not, one of the reasons people buy into their ecosystem is ease of setup across different devices. In a world where people customize the applications on their laptops to cross over with their mobile phones, an easy setup is a key to getting the most value from their devices. However, in the world of security information and event management (SIEM) solutions, the time to value often takes longer than most security teams want to admit.

Europol Warns of Social Engineering Attacks

Social engineering remains a primary initial access vector for cybercriminals, according to a new report from Europol. “Social engineering, which exploits human error to gain access to systems or personal information, stands out as a prominent technique used by criminal actors in this context,” Europol says.

The Power of Patents as Netskope "Customer Zero"

As Netskope approaches the 300 patent milestone, I sat down for a quick chat with our CISO James Robinson to hear about the most recent patent granted to his team, find out why he sees patents as being so important, and discover what they tell us about the way his team—the team in charge of cybersecurity at a cybersecurity company—innovates.

Tech Under Siege: Unpacking Cyber Threats in Trustwave's 2025 Risk Report

Threat actors know that technology makes the world go round, and these adversaries are more than willing to use every cyber weapon at their disposal to take advantage of that fact, according to Trustwave SpiderLabs’2025 Trustwave Risk Radar Report: Technology Sector.

Understanding CRA Compliance: Overcoming Challenges with an Integrated Security Testing Approach

Shipping software into the EU now comes with serious strings attached. The Cyber Resilience Act (CRA), in effect since December 2024, sets strict new rules for any company offering digital products or services in the region, whether you’re a local startup or a global platform. The regulation aims to improve cybersecurity across connected devices and cloud-based software.

What's New in CyCognito: June 2025 Platform Enhancements

In today’s high-stakes cybersecurity landscape, one truth stands out: if you can’t see it, you can’t secure it. And if you can’t act on what you see, you’re no better off. That’s why we’re focused on delivering continuous improvements that help security teams move faster, see further, and reduce risk where it matters most.

The Heightened Threat of Iranian Cyber Attacks: How to Understand the Risk and Enhance Resilience

The physical conflict involving Iran that has played out in the Middle East over the last several days is expected to increasingly spill over into the cyber realm. According to the Department of Homeland Security, the Cybersecurity and Infrastructure Security Agency (CISA), and other cybersecurity experts, organizations in the US should begin preparing for increased cyber attacks from pro-Irianian hacktivists and Iranian government-affiliated actors in the coming days and weeks.

Trustwave SpiderLabs' 2025 Risk Radar Report: Technology Sector

Threat actors know that technology makes the world go round, and these adversaries are more than willing to use every cyber weapon at their disposal to take advantage of that fact, according to Trustwave SpiderLabs’ 2025 Trustwave Risk Radar Report: Technology Sector.

2025 Trends in IoT Device Identity and Access Management (IAM)

As the number of IoT devices and connected devices continues to surge, IoT security has become a critical component of the modern IoT ecosystem. Ensuring the confidentiality, integrity, and availability of data across IoT networks is essential to protect against cyber threats and data breaches. With billions of devices now connected to the internet, the attack surface for malicious actors has expanded dramatically, making robust security measures more important than ever.

Best Tools to Scan Open Source Dependencies in 2025

Open source libraries form the backbone of modern software – but they can also introduce serious vulnerabilities if left unchecked. High-profile incidents like the Log4j “Log4Shell” fiasco proved that a single flawed dependency can put countless organizations at risk. In fact, a 2024 report found that 84% of codebases contained at least one known open source vulnerability, and 74% had high-risk vulnerabilities – up sharply from the previous year.