Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Empowering Business-Led Innovation with Security at the Core

With AI moving faster than ever, businesses are embracing GenAI and Agentic AI to supercharge their development processes, enabling both technical and non-technical users to build, innovate, and automate. However, the need for security in this space has never been more critical. That’s where Zenity comes in and why I’m so excited to join the company, especially at a time of immense growth and expansion given our recent Series B funding.

Building Trust in Digital Retail: How Identity Security Protects E-Commerce

As retailers prepare for a season of high-demand online shopping, the risks of cyberthreats continue to grow, much like the need for increased security in a bustling mall on busy shopping days. In today’s retail landscape, identity security serves as the “mall security team” of the digital world—working behind the scenes to protect customer trust and to help ensure seamless, secure shopping experiences.

What's New in Calico: Fall 2024 Enhancements for Kubernetes Networking and Security

It’s almost time for KubeCon North America, and we’re excited to share the latest updates in Calico. These updates improve network and runtime security, make it easier to use, and extend Calico’s strong network security and observability for Kubernetes to VMs and hosts that are not part of Kubernetes clusters.

Cyber Retail Fraud: A New Twist on an Old Game

People have always been susceptible to a deal that is too good to be true. In the 1800s, American con man George C. Parker was best known for his repeated successes in "selling the Brooklyn Bridge” to the unwary. Then, in the 1900s it became popular to sell "valuable" Florida real estate that turned out to be swampland.

Attack Vector vs Attack Surface

Attack vectors and attack surfaces are both critical concepts in cybersecurity, closely related yet distinct in their roles and implications. Understanding the similarities and differences between them is key to developing robust security strategies. This article will detail what both concepts involve, why they’re crucial, and methods your organization can conduct to enhance its current security posture.

Cross-Site Request Forgery Cheat Sheet

“Aren’t you a little short for a Stormtrooper?” In this iconic Star Wars moment, Princess Leia lazily responds to Luke Skywalker, disguised as one of her Stormtrooper captors and using authentication information to open her cell. In other words, Star Wars acts as an analogy for a cross-site request forgery (CSRF) attack. In a CSRF attack, malicious actors use social engineering so that end-users will give them a way to “hide” in their authenticated session.

Taking the Pain Out Of Compliance for Legal and GRC Teams

The legal department plays a crucial role in enhancing enterprise security profiles. Historically, legal and cybersecurity departments have been siloed from one another in organizations both large and small. With security now a concern at the Board level, legal’s role in enterprise risk management – advising on threats and potential liability – must include the impact of data security threats.

Announcing the General Availability of Splunk Enterprise Security 8.0

At.conf24 we unveiled the private preview of Splunk Enterprise Security 8.0, and the buzz was undeniable. Today, we are thrilled to announce that Splunk Enterprise Security 8.0 is now generally available! This isn’t just another release—it’s a massive leap forward that redefines and revolutionizes security operations. Splunk Enterprise Security 8.0 is the cornerstone of the SOC of the Future.