Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Trustwave Strengthens Partnership with Microsoft to Enhance Cybersecurity in APAC

Trustwave has further solidified its partnership with Microsoft by achieving Microsoft FastTrack Ready partner status for Microsoft 365 and being named a Microsoft Verified Managed Extended Detection and Response (MXDR) solution provider for the Asia Pacific (APAC) region. This recognition underscores Trustwave's commitment to empowering organizations across Australia and the wider APAC region with advanced cybersecurity solutions.

Announcing Jit's New Partnership with Loom Security: Bringing Cloud-Native Security into Focus

Securing applications is more challenging than ever. Companies are faced with increasingly complex infrastructures that demand higher levels of protection to mitigate security risks effectively. That’s why Jit is thrilled to announce our new partnership with Loom Security, a leading professional services firm dedicated to helping companies secure their applications in the cloud.

Strength in Numbers - Your Intelligence Sharing Advantage with ThreatQ

Threat intelligence sharing has become a strategic imperative for organizations that are looking for a force multiplier to help them better understand and defend against the rapidly evolving threat landscape. In fact, from the White House to CISA to government agencies around the world, there’s a global focus at the highest levels on breaking down barriers and modernizing approaches to cyber threat data sharing.

Announcing the New Cloud Exchange 5.1.0 Update

This blog series continues to explore a number of different workflows that those comfortable using basic scripting, or enablement tools like Postman, can employ to programmatically update and inform your inline policy actions. These are just some of the functions that the newest version of Cloud Exchange (CE), version 5.1, supports now and in the future.

Adding runtime threat detection to Google Kubernetes Engine with Falco

One of the big advantages of running your workloads on a managed Kubernetes service like Google Kubernetes Engine (GKE) is that Google ensures your clusters are being deployed and managed following industry best practices. While GKE clusters are incredibly secure and reliable, there is always room for improvement. In this blog, we’re going to describe how you can enhance GKE’s already great security by adding runtime threat detection with Falco.

CMMC 2.0 Explained: What You Must Know For 2025

With the final CMMC rule published, here’s a summary of everything you need to know for your CMMC Level and when. Another step closer. After more than seven years in the making, the US Department of Defense (DoD) finalized a rule establishing the Cybersecurity Maturity Model Certification (CMMC) program and outlining how it will work. The final program rule was published in the Federal Register on 15 October and will go into effect on 16 December.

DORA Compliance Checklist: Essential Steps for Successful Implementation

DORA is an EU-based regulation that is going to be effective from January 17, 2025. It is a digital security framework that works alongside the General Data Protection Regulation (GDPR) to provide strong security protection to financial entities and ICT service providers from cybercrimes. Generally, every financial entity and ICT service provider inside or outside the EU that does business with the EU entities has to comply with DORA.

Delete Registry Keys Using PowerShell

In Windows system administration, one of the more advanced yet important tasks that can be accomplished using PowerShell is deleting registry keys and values. This operation requires careful handling to avoid unintended consequences. Registry keys and values in Windows are critical components that store configuration settings for the operating system and installed applications. Modifying the registry can lead to system instability or even failure if not done correctly.

Operation Magnus: Analyzing the cybercrime community reaction

International cooperation has become crucial to disrupt the operations of malicious cybercrime actors. A prime example of this is ‘Operation Magnus’ which has showcased the effectiveness of global collaboration in tackling sophisticated threats. By dismantling their infrastructure and exposing key players, Operation Magnus not only delivered a significant blow to cybercriminals but also sent shockwaves throughout underground forums and dark web communities.

API Security: The Non-Negotiable for Modern Transportation

The transportation sector is undergoing a digital revolution, from railways to aviation and trucking. APIs are at the heart of this transformation, particularly for airlines. Airlines utilize APIs to integrate internal systems with vital services such as booking platforms, check-in services, real-time flight updates, communication with customs agencies, and baggage handling.