Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

A Complete Guide to IT Risk Assessment

Most IT audit risk assessments fail because they treat risk as something to mitigate, not leverage. This leads to bloated reports, rigid frameworks, and security initiatives that slow innovation instead of driving it. Risk isn’t just a security concern—it’s a business decision. The best CTOs approach risk like an investment portfolio, with some risks to be minimized, but others that can be accepted or embraced for competitive advantage.

Why East/West Traffic Needs Zero Trust

Zero trust is no longer just a concept—it’s essential. With cloud adoption, hybrid work, and increasingly sophisticated cyber threats, traditional perimeter security no longer suffices. Attackers exploit vulnerabilities inside networks, moving laterally undetected. Many organizations focus on securing north-south external-facing interactions while failing to monitor internal east-west traffic. This oversight exposes networks to ransomware, insider threats, and supply chain attacks.

From checkbox to confidence: Why passing the audit isn't the endgame

Every year, companies across industries breathe a collective sigh of relief when the auditors give the thumbs-up. The SOC 2, ISO 27001, PCI DSS – pick your acronym – get ticked off, and it’s back to business. But let’s be honest: how often does that success feel earned? More than a few security and compliance teams have walked out of an audit room with relief, not pride.

Examining the NIS2 Directive: The UK perspective

The EU’s NIS2 directive came into force on October 17, 2024. Notis Iliopoulos, VP MRC. Obrela explores the latest cyber resilience Directive’s pros and cons and suggests an alternative route the UK government might consider in developing its cybersecurity framework post-Brexit. The NIS2 Directive, which builds upon the original Network and Information Systems (NIS) Directive, aims to enhance the cybersecurity posture of critical sectors across the European Union.

Critical Security Threats Facing Governments Agencies

The cybersecurity risks facing government agencies have evolved dramatically in recent years. Foreign actors, criminal organizations, and malicious insiders are significant threats to sensitive operations and infrastructure. Agency leaders must focus on comprehensive security strategies that address sophisticated external attacks and potential insider risks.

Top IoT Security Platform for MSSPs: What to Look for in 2025

An IoT security platform helps protect connected devices from cyber threats. This article covers the key features to look for in these platforms and how to choose the best one for your needs in 2025. Additionally, the importance of data privacy in IoT security platforms cannot be overstated.

Backup: Why it's important to stay up to date with your data

Today, data is one of organizations' most valuable and vulnerable assets. Effective backups are essential for operational continuity and cybersecurity. With 80% of businesses exposed to ransomware attacks, this World Backup Day emphasizes the need to regularly back up critical systems to minimize downtime and ensure quick recovery from incidents. However, many organizations still face challenges with backup and restoration processes.

Empower Your Defense With Data Loss Prevention Controls and Automated Alert Remediation

In today's digital world, the stakes of data loss are high, and the cost of cybercrime continues to escalate. In fact, Ponemon Institute estimated that the average cost of a data breach was $4.45 million in 2023, a 15% increase over the previous three years. As a result, organizations are now deploying a combination of detection and remediation controls in addition to Data Loss Prevention (DLP) technologies. Why?

Kubernetes IngressNightmare Vulnerabilities: What You Need to Know

We would like to recognize Amit Serper, Travis Lowe, Tony Gore, Adrian Godoy, Mihai Vasilescu, Suraj Sahu, Pablo Ramos, Raj Jammalamadaka, Lacie Griffin, and Josh Grunzweig for their contributions in authoring this publication. CrowdStrike is committed to protecting our customers from the latest disclosed vulnerabilities. We are actively monitoring activity surrounding “IngressNightmare,” the name given to recently identified vulnerabilities in the Kubernetes (K8s) ingress-nginx controller.

EP 4 - AI-Powered Fraud: Redefining the Identity Threat Landscape

Imagine receiving an urgent email from your bank that looks perfectly legitimate. It warns you of a suspicious transaction and prompts you to verify your identity. You hesitate but click, and suddenly, your credentials are compromised. This scenario, crafted by AI-powered fraud-as-a-service, is happening now.