Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Why is Vulnerability Management-as-a-Service Essential for Businesses?

As cyber threats get smarter and more common, companies of all sizes need to make vulnerability management a top priority to keep their private data safe and their operations running smoothly. Traditional vulnerability management methods, which involve a lot of manual work and restricted visibility, aren't working well against the complicated problems that modern cyberattacks pose.

Stay Focused on Relevant Threat Intel Through Scoring and Expiration

John Lennon popularized the phrase, “Life is what happens when you’re making other plans.” And that’s an apt characterization for how we think about threat intelligence. We tend to focus on it to block or alert-on an attack. Meanwhile life is what’s happening to our threat intel while we’re making these plans. When we don’t pay attention to the threat intelligence lifecycle, we can run into trouble.

Warnings After New Valencia Ransomware Group Strikes Businesses and Leaks Data

A new ransomware operation has started to leak information it claims has been stolen from organisations it has compromised around the world. In recent days Valencia Ransomware has posted on its dark web leak site's so-called "Wall of shame" links to gigabytes of downloadable information that has seemingly been exfiltrated from a Californian municipality, a pharmaceutical firm, and a paper manufacturer.

Deciphering the Loss Exceedance Curve in Cyber Risk Quantification

On-demand cyber risk quantification (CRQ) models have the power to assess an organization’s unique risk profile and, subsequently, generate data-driven insights that facilitate informed risk management decisions. The basis of these insights is grounded on a probabilistic approach to event forecasting, which involves simulating thousands of potential cyber scenarios a business may experience over a given period, typically the upcoming year.

Cloudflare partners with Internet Service Providers and network equipment providers to deliver a safer browsing experience to millions of homes

In 2018, Cloudflare announced 1.1.1.1, one of the fastest, privacy-first consumer DNS services. 1.1.1.1 was the first consumer product Cloudflare ever launched, focused on reaching a wider audience. This service was designed to be fast and private, and does not retain information that would identify who is making a request. In 2020, Cloudflare announced 1.1.1.1 for Families, designed to add a layer of protection to our existing 1.1.1.1 public resolver.

Public Sector Breach Alert: Q3 2024

The public sector has faced a surge of cyber attacks in recent months, targeting state agencies, schools and local governments, severely affecting operations. Several recently released cyber industry reports show a steady or growing number of ransomware attacks so far in 2024. The examples below are just some of the cyber attacks against public sector organizations this past summer.

O365 Monitoring: Ensuring Security and Efficiency in Your Office 365 Environment

Many businesses depend on cloud-based tools like Office 365 to run their daily business. Because of this, O365 monitoring has become much more important for making sure that your Office 365 environment runs easily, safely, and effectively. Office 365 is more than just an email service; it's a full suite with efficiency apps, tools for working together, and storage for files. But this huge environment could also be a target for cyber threats, so it's important to keep an eye on and protect its activities.

Identifying Insecure C Code with Valgrind and Fixing with Snyk Code

C and C++ remain foundational in critical software development. These languages power a wide array of systems, from embedded devices to high-performance applications in manufacturing, operational technology (OT), and the industrial market. Their efficiency, control over system resources, and performance make them indispensable for developers working on mission-critical projects.

Why the CISO & CIO Must Partner for Cyber Resilience

In today’s interconnected world, where the digital landscape is constantly evolving, the threats to an organization’s cybersecurity posture are more sophisticated and pervasive than ever before. Relying on traditional, largely prevention-focused cybersecurity tools and approaches is not enough. Cyber attacks are inevitable.

The Relation Between Breaches and Stock Price Drops

When discussing the consequences of a data breach for organizations, we usually consider three types of damage: financial, legal, and, somewhat more tenuously, reputational. But what about stock prices? One would assume that stock price—an indicator of a business’s overall health and investor confidence—would plummet after a breach, but is this really the case?