Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Calico Network Threat Detection Works

In today’s cloud-native environments, network security is more complex than ever, with Kubernetes and containerized workloads introducing unique challenges. Traditional tools struggle to monitor and secure these dynamic, interconnected systems, leaving organizations vulnerable to advanced threats, such as lateral movement, zero-day exploits, ransomware, data exfiltration, and more.

PCI 4 for SAQ-A & SAQ-A-EP: Everything Merchants Need to Know to Master PCI DSS 4 Compliance

PCI DSS 4 introduces new requirements for SAQ-A and SAQ-A-EP Merchants. Key new changes are Requirements 6.4.3 and 11.6.1. While these requirements play a crucial role in preventing and detecting e-commerce skimming attacks they also require merchants to implement and operate new technical capabilities on payment webpages. Requirements 6.4.3 and 11.6.1 apply to all scripts executed in a consumer’s browser on payment pages, defined as web-based interfaces that capture or submit account data.

CIO POV: Ransomware and Resilience-2024's Biggest Cyber Stories

Let’s begin 2025 with an understatement about last year: 2024 was an eventful year for cybersecurity. That in itself is no surprise. The specifics, though, looked like this: AI use accelerated (for good and for bad), ransomware surged and relentless attacks on third parties shifted focus to cyber resilience.

The 4 categories of ISO 27001 controls

Information security is no longer optional; it’s critical to running a successful, resilient business. ISO 27001, the international standard for information security management systems (ISMS), provides a structured approach to safeguarding data. Central to this framework are the 93 controls in Annex A, which are divided into four categories: organizational, people, physical, and technological.

Data Exfiltration: What It Is, Examples, and Prevention Tips

Data security is vital to your organization’s well-being. A single data breach costs $4.88 million on average, according to IMB’s Cost of a Data Breach Report 2024. Besides financial losses, data exfiltration may damage a brand’s reputation, cause operational disruptions, and result in legal actions. Therefore, giving maximum attention to your cybersecurity measures and constantly enhancing them is a must.

Phishing for Gamers: Fake Offers Invite Gamers to Test New Gaming Titles

A phishing campaign is targeting users with phony offers to beta test new video games, according to researchers at Malwarebytes. The phishing messages are sent via Discord, email, or text message. The messages purport to come from a game developer, and include a link to download an archive supposedly containing the game’s installer.

Opti9 and Backblaze Partner to Enable Expansion into Canadian Market

Opti9’s partnership with Backblaze has reached an important new milestone: the launch of the Canada East (CA East) data region. By leveraging Opti9’s expertise in Canadian data centers, Backblaze is now able to expand its footprint and meet the growing demand for compliant, high-performance cloud storage solutions in Canada.

Public Data at Risk: Key Breaches of Q4 2024

In 2024, the public sector faced a number of data breaches, highlighting the vulnerability of government agencies and public institutions in the face of evolving cyber threats. From leaked sensitive data to ransomware attacks targeting critical infrastructure, these incidents exposed significant gaps in cybersecurity measures. As cybercriminals grow more sophisticated, the stakes for protecting personal and national data have never been higher.

Seven Cyber Threats Facing the Retail Industry and How To Defend Against Them

Some common cyber threats facing the retail industry include ransomware attacks, social engineering, system intrusions and insider threats. The retail sector is often targeted by cybercriminals because of the valuable customer data it processes, including credit card information, Personally Identifiable Information (PII) and shopping patterns. This data is often collected and sold on the dark web for financial fraud or identity theft.