Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Cloud Native Security: Strategies, 4 C's, and Astra Security

Cloud-native services are increasingly relied on for building and running applications rather than having on-premise data centers. This is because it is more economical in terms of security, maintenance, and capacity. Cloud-native security is an important consideration for users since the protection of the codes, applications, and customers’ data is heavily dependent on it.

Container Security with Calico: Detect and Respond to Container Attacks with Network Anomaly Detection

Considering the vast attack surface and flat network architecture, Kubernetes workloads are particularly susceptible to network-based threats. While following best practices like workload access controls, workload-centric IDS/IPS, and WAF can help prevent and block attacks, anomaly detection has become crucial in today’s IT landscape to proactively anticipate security threats.

Identity Security's Crucial Role in Safeguarding Data Privacy

More than 130 global jurisdictions have enacted data privacy laws. While each contains rules and requirements distinct to their regions, they share a common priority: identity security. That’s because if an attacker compromises a single identity in an organization where sensitive data is collected, stored and handled, it’s all downhill from there.

Real-time threat protection with Snyk and SentinelOne

Modern applications are made up of more than first-party code and third-party dependencies. Even a single application links back to a vast ecosystem of cloud environments, containers, third-party base images, and automated container orchestration. Along with the ability to build applications faster, developers also need to secure code and associated dependencies, deployment configuration, and containers running in production.

Rego for beginners Part 2: Combining queries with AND/OR and custom messages

This blog post series offers a gentle introduction to Rego, the policy language from the creators of the Open Policy Agent (OPA) engine. If you’re a beginner and want to get started with writing Rego policy as code, you’re in the right place. In this three-part series, we’ll go over the following: As a reminder, Rego is a declarative query language from the makers of the Open Policy Agent (OPA) framework.

Lessons from the Human Risk Summit with Nadine Michaelides and Jinan Budge

Following the release of the Phishing Threat Trends Report, we recently hosted the Human Risk Summit, a coming together of some of the biggest names in the industry to discuss the human element and the role it plays in cybersecurity. In this post, we’ll recap some of the themes, statistics, and insights from two of our speakers – Nadine Michaelides of University College London and Jinan Budge of Forrester.

Outpost24 adds Threat Explorer to threat intelligence platform for advanced vulnerability intelligence and exposure time reduction

Philadelphia, PA, November 9, 2023 – Leading cyber risk management and threat intelligence provider Outpost24 today announced the release of Threat Explorer, an advanced vulnerability intelligence and custom alerting tool for continuous threat monitoring.

CVE-2023-3595: Rockwell Automation ControlLogix Vulnerability Analysis Fuels Better Risk Assessment and Threat Detection

On July 14, CISA published an industrial control system (ICS) advisory about two new critical vulnerabilities affecting Rockwell Automation ControlLogix communication modules: CVE-2023-3595 and CVE-2023-3596. CISA and Rockwell Automation recommended that asset owners patch vulnerable devices and add controls such as segmenting networks and using network intrusion detection.