Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Detecting Suspicious ESXi Activity Before Ransomware Happens

Cybersecurity teams worldwide have been fighting against ransomware attacks on ESXi infrastructure for years. ESXi is a lightweight, bare-metal hypervisor developed by VMware that allows multiple virtual machines to run on a single physical server. ESXi is widely used in enterprise environments, often hosting virtual machines that support essential services for an entire organization.

Beyond PCI and HIPAA: How Feroot Powers Australian Privacy Act (APA) Compliance

Yes—if your website collects data from individuals located in Australia, the Australian Privacy Act (APA) may apply, even if your company is not based there. This law is enforced by the Office of the Australian Information Commissioner (OAIC) and governs how “APP entities” handle personal information—including that collected by websites, apps, scripts, and third-party services.

CrowdStrike's Approach to Better Machine Learning Evaluation Using Strategic Data Splitting

Since day one, CrowdStrike's mission has been to stop breaches. Our pioneering AI-native approach quickly set our platform apart from the landscape of legacy cybersecurity vendors that were heavily reliant on reactive, signature-based approaches for threat detection and response. Our use of patented models across the CrowdStrike Falcon sensor and in the cloud enables us to quickly and proactively detect threats — even unknown or zero-day threats.

Why Gartner Declared EASM Obsolete Before it Became Mainstream

Hint: EASM by itself is a means, not an end. In the rapidly evolving landscape of cybersecurity, few innovations have shown as much early promise as External Attack Surface Management (EASM). Its core value proposition the ability to continuously discover, inventory, and monitor all internet-facing assets of an organization was compelling from the start. Yet, despite its utility and adoption across multiple cybersecurity disciplines, Gartner recently declared EASM an obsolete standalone product category.

From Data Overload to Action: Why Modern Vulnerability Management Must Be Workflow-Driven

We all know where vulnerability management fits into an overall security strategy; it provides the raw data that analysts use to figure out what’s wrong and what needs to be fixed. The problem is, traditional VM stops there – leaving analysts to do all the work. Today’s companies don’t have the luxury of doing that anymore. Experts are needed on the front lines, not vetting false positives, and VM solutions that deliver nothing but a data dump are on the road to becoming obsolete.

Now Supporting Microsoft Purview: Secure Productivity with BlueVoyant Starts Here

As organizations rapidly embrace generative AI tools like Microsoft 365 Copilot to boost productivity and innovation, a critical question emerges: Is your data fully protected against today's accelerating and deepening threat landscape? The integration of generative AI tools (such as Microsoft 365 Copilot) into daily workflows brings unprecedented opportunities to enhance productivity. Yet equally unprecedented risks to your organization's most sensitive information.