Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Threat Assessment: Connected Medical Devices

The terminology that describes medical devices and connected medical devices can be confusing. Let’s start by looking at how these devices are defined. Medical Device: a contrivance designed and manufactured for use in healthcare, and not solely medicinal or nutritional. Internet of Medical Things (IoMT): devices linked to cloud platforms that store and analyze data.

Importance of Encryption in Messaging Apps

It's almost impossible to imagine modern life without using messengers and other text apps. We have all become more or less dependent on convenient online communication. After all, it is also lightning-fast. We use messaging apps for work, and to communicate with friends and family. And also to share personal information. Yet, are we sure that our content actually remains private? What is clear is that as the volume of digital communication increases, so does the importance of ensuring the privacy and security of our content.

The Importance of Internet Cybersecurity in Residential Networks

In a time where home internet has become a vital necessity for everyday living, guaranteeing the safety of your network and data is of utmost importance. As technology progresses, so do the techniques and instruments employed by cybercriminals to breach internet security. Be it shielding personal details or securing your smart home gadgets, comprehending the importance of internet security in residential networks is vital.

How does your AWS environment stand up to the MITRE ATT&CK framework?

In today’s digital age, adopting public cloud platforms like Amazon Web Services (AWS) security means reinforcing them. AWS is a complex and versatile platform. When problems or security incidents arise, it's important to have a systematic approach to investigation and analysis or it can quickly become noisy with lots of false positives. This is where the Adversarial Tactics, Techniques, and Common Knowledge (MITRE ATT&CK) framework can help.

How are IT leaders and their MSPs approaching threat hunting?

Companies are increasingly aware of the importance of creating detection and hunting capacities that help to keep their business’s future from being put at risk. The popularity of threat-hunting services is a consequence of detecting ever more persistent attacks, which also last longer and longer. On top of this, cybercriminals also have ever more tactics to avoid traditional defense measures.

Embracing Zero Trust: Revolutionizing Cloud Technology Adoption

As technology continues to advance, cloud computing has become an integral part of our digital landscape. While the benefits of cloud technologies are undeniable, concerns about data security and privacy have often overshadowed and slowed down its adoption. However, a new paradigm shift called “Zero Trust” is poised to revolutionize the way we perceive and embrace cloud technologies.

Bitsight's Partnership with Moody's Continues to Evolve - Making Cyber Risk Actionable for Business Leaders

Moody’s investment in Bitsight in 2021 was founded on the belief that cyber risk is business risk. Two years later - this foundational belief is clearer than ever by evidence of recent research developed by the two companies. This blog post is a reflection on the research progress made by the two firms since the announcement of the partnership.

Top four Kubernetes Attack Chains and how to break them

While Kubernetes adoption continues to soar, it has become a prime target for cyberattacks. Unfortunately, Kubernetes clusters are complex and can be difficult to secure. Safeguarding your Kubernetes environment requires a solid understanding of the common attack chains that pose a threat to your infrastructure. In this blog post, we dig into the top attack chains that target Kubernetes, shedding light on the risks and offering valuable insights to bolster your defenses.