Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How to Build Your Cybersecurity Leadership Skills as a SOC Analyst

Leadership skills are important for career growth in any industry, and cybersecurity is no exception. While you can certainly have a long, fulfilling career as a SOC analyst, you may be interested in moving up the ranks into a leadership position one day. Whether you aspire to be a SOC director or even a CISO, these tips will help you position yourself and develop the skills needed to move into a cybersecurity leadership role.

Enhance your search experience within Splunk by using the Corelight App

The Corelight App for Splunk provides the foundation for organizations to boost SOC effectiveness and productivity by using Corelight data in Splunk. In this blog, I’ll walk through how the Corelight App leverages Splunk’s Common Information Model (CIM) to enhance users' search experience when they are using Corelight data.

How To Spot a Catfish Online

As people use social media and dating apps to connect with others, they risk falling victim to catfishing scams. However, catfishing can be easily spotted when looking for signs such as a request for money and a newly made account. It is best to know these signs to avoid any financial loss, data leaks or mental and emotional strain. Continue reading to learn more about what catfishing is, how dangerous it can be, the signs to look out for, how to deal with it and how to avoid it in the future.

Beware of Fake iPhone 15 Upgrade Emails

With the new iPhone 15 release, scammers are taking advantage by impersonating mobile carriers or Apple support, claiming their target is eligible for a free or discounted iPhone upgrade. The scammer’s goal is to get their target to provide personal and financial information which is then used to attempt identity theft or make unauthorized charges. Read on to learn what signs to look out for and what to do if you fall victim to this iPhone 15 scam.

DISP: Securing the Australian Defence Supply Chain

The Defence supply chain is a network of interrelated companies, services, and products that transform raw materials and information into goods and expertise for military materiel applications. Given the scale, breadth, and complexity of bringing so many different stakeholders and activities together, the risks that a supply chain presents can be challenging to define and manage.

How to respond to the curl and libcurl vulnerabilities

As referenced in our previous post, the software development world has been bracing for additional details regarding two vulnerabilities associated with cURL, one of which was assessed as critical by the maintainer and original creator of the project. The wait ended this morning, as a fixed version was released and details about the vulnerabilities were provided.

Microsoft 365 targeted by Cybercriminals with LinkedIn Smart Links Cyber Attacks

What Are Microsoft 365 LinkedIn Smart Links? LinkedIn Smart Links are a relatively new feature introduced by LinkedIn to simplify the way users share content, profiles, and documents within the platform. Smart Links allow you to share specific pieces of content, making it easier for connections to access information you deem relevant. Smart Links are dynamic, which means they change each time someone accesses the link.

What Is a SOC 2 Bridge Letter? With Examples!

Picture this: you’re a service organization that has aced your SOC 2 audit, and now your prospects are becoming customers at record speed as you prove your commitment to data security. But what happens in the interim period between one SOC report and the next? Enter the SOC 2 Bridge Letter, which fills the gap and keeps your compliance game on point. In this blog post, we’ll dive deep into the world of bridge letters, exploring their significance, components, and responsibilities.

5G's role in telemedicine: The future is now

Healthcare and technology have always gone hand in hand. Telemedicine, which lets you talk to doctors without visiting them in person, is a great example. A few years back, it might have sounded like science fiction. But today, it's a regular part of many people's lives. In fact, data shows that 80% of people have used telemedical services at least once in their lives.

KnowBe4 Named a Leader in the Fall 2023 G2 Grid Report for Security Awareness Training

We are thrilled to announce that KnowBe4 has been named a leader in the latest G2 Grid Report that compares security awareness training (SAT) vendors based on user reviews, customer satisfaction, popularity and market presence. The latest G2 Grid Report compares Security Awareness Training (SAT) vendors based on user reviews, customer satisfaction, popularity and market presence.