Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Brex's CISO Mark Hillick on avoiding tool bloat and learning from high-severity incidents

In this week’s episode of The Future of Security Operations podcast, I'm joined by Mark Hillick, CISO at Brex. Mark’s experience in the security industry spans more than two decades. He started out as a security engineer at Allied Irish Banks before advancing through companies like MongoDB to become Director and Head of Security at Riot Games. His book, The Security Path, features over 70 interviews with security professionals on their career journeys. Mark and I discuss.

CrowdStrike Falcon Privileged Access Unifies Identity Protection Across Critical Environments

CrowdStrike is excited to announce CrowdStrike Falcon Privileged Access, a new offering within CrowdStrike Falcon Identity Protection that uses high-fidelity risk signals to provide just-in-time access to organizations’ critical permissions and resources. Adversaries know valid credentials unlock access to data, infrastructure, and capabilities.

XRP supply chain attack: Official NPM package infected with crypto stealing backdoor

At 21 Apr, 20:53 GMT+0, our system, Aikido Intel started to alert us to five new package version of the xrpl package. It is the official SDK for the XRP Ledger, with more than 140.000 weekly downloads. We quickly confirmed the official XPRL (Ripple) NPM package was compromised by sophisticated attackers who put in a backdoor to steal cryptocurrency private keys and gain access to cryptocurrency wallets.

4 Reasons to Treat Backup as a Vital Part of Jira Sandbox to Production Migration

There is no doubt that Jira Sandbox’s migration to a production environment requires a well-thought-out execution supported by a robust fail-safe. This is followed by recommended best practices for the process and, above all, swift data backup tools. Going further, a backup is not just an emergency measure—it’s an integral part of your migration strategy.

"Toward Automating IoT Security": Why It Matters and How KeyScaler Is Leading the Way

The global Internet of Things (IoT) ecosystem is growing at an unprecedented rate. It’s estimated that by 2030, there will be over 75 billion connected devices worldwide, up from approximately 12 billion in 2020. This massive growth presents significant opportunities, but it also exposes critical vulnerabilities, particularly when it comes to securing these devices.

How to Break the Cyber Attack Lifecycle: A Step-by-Step Defense Guide

The numbers are startling – organizations typically need 197 days to spot a cyber attack and another 69 days to contain it. This leaves systems vulnerable for more than eight months. The financial impact keeps growing. A typical cyber attack now costs organizations $4.45 million in damages – a 15% increase in the last three years. But there’s good news: cybersecurity works like asymmetric warfare. Defenders can stop an entire attack by breaking just one link in the attack chain.

Eliminating Security Blind Spots and Closing Security Gaps with Fidelis Elevate

Digital transformation has expanded IT environments beyond traditional boundaries. Data now exists on-premises, across multiple clouds, on endpoints, and within shadow IT. This expansion creates environments where security blind spots introduce significant risk and create dangerous security gaps. According to recent data, organizations take an average of 277 days to identify and contain breaches. Companies that contain breaches in under 200 days save an average of $1.12 million.

Less noise, more signal: How Elastic Defend slashed event volume

When an EDR tool generates too much endpoint telemetry, security teams quickly run into problems. Mountains of process events, network connections, and file operations can overwhelm analysts, making it harder to spot real threats in the noise. High data volumes drive up storage costs, slow down searches, and contribute to alert fatigue — leading to longer investigation times and potential blind spots.

Digital Hygiene in Healthcare: Where Cybersecurity Is a Matter of Life and Death

The healthcare industry is a prime target for cyberattacks due to the significant value of medical data and the critical nature of patient care. Unlike other sectors, healthcare organizations must balance cybersecurity with the need for immediate access to life-saving information. Ransomware attacks, in particular, have surged, with cybercriminals exploiting outdated systems, unpatched vulnerabilities, and human error to disrupt operations.