Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Introducing our report, CISO Perspectives: Separating the realityof AI fromthe hype

The explosion of AI has ignited both excitement and apprehension across various industries. While AI is undeniably having a positive impact on engineering and customer service teams, cybersecurity and IT practitioners remain cautious. Concerns about data privacy, the inflexibility of disparate tools, and the sensitive nature of many mission-critical workflows—which, more often than not, require some level of human oversight—fuel a deep mistrust of LLMs by these teams.

A brief introduction to Industrial Control Systems and Security

You may not know it, but much of your daily life depends on Industrial Control Systems(ICSs). From the power you're using right now to the water you drink, it all depends on Programmable Logic Controllers (PLCs) and other ICS tech to be delivered. In fact, nearly any time something in the physical world needs to be automated, there will be an ICS involved.

LLM Security: Splunk & OWASP Top 10 for LLM-based Applications

As a small kid, I remember watching flying monkeys, talking lions, and houses landing on evil witches in the film The Wizard of Oz and thinking how amazing it was. Once the curtain pulled back, exposing the wizard as a smart but ordinary person, I felt slightly let down. The recent explosion of AI, and more specifically, large language models (LLMs), feels similar. On the surface, they look like magic, but behind the curtain, LLMs are just complex systems created by humans.

Monitor Akamai Zero Trust and Application Security with Datadog Cloud SIEM

Akamai is a cloud content delivery and security platform that helps organizations secure their applications, APIs, network access, and credentials that workforces and customers use every day. Akamai Zero Trust provides enhanced security for users, devices, and data across an organization by securing access to the corporate network, SaaS applications, email, and other resources.

The Importance of API Security Governance in a Dynamic Threat Landscape

As noted in the 2024 Gartner Market Guide for API Protection“API security governance is an emerging capability. It allows the administrator of the tool to define and enforce security policies. Unlike posture management, this is a top-down enforcement. It also allows for compliance reports for specific regulations to be generated automatically.” This capability is becoming increasingly important as organizations face a constantly evolving threat landscape.

2024 State of Secrets Report

With the rise in collaboration apps like Slack, GitHub, and ChatGPT, it’s easy for employees and customers alike to share secrets in messages, files, repos, and other places where they shouldn’t be shared. Though this so-called “secret sprawl” may seem trivial at first, all it takes is one misplaced password or API key for a threat actor to escalate their privileges and access your organization’s crown jewels: Your data.

New Malvertising Campaign Impersonates Google Authenticator

Researchers at Malwarebytes spotted a malvertising campaign that abused Google Ads to target people searching for Google Authenticator. If someone typed “Google Authenticator” into Google, the malicious ad would be at the top of the search results. The ad copied the website description from the real Google Authenticator, but would redirect users to a phishing site. “We can follow what happens when you click on the ad by monitoring web traffic,” the researchers explain.

Effective Board Communication: Lessons from CrowdStrike for CISOs

The 2024 CrowdStrike Incident blue-screened Microsoft computers worldwide, causing significant disruptions to high-profile industries such as transportation, healthcare, and financial services. Now that the world has largely recovered, the most forward-minded chief information security officers (CISOs) are focusing on using the incident as an opportunity for continuous improvement. How can they prevent similar incidents from having such a disastrous impact on their organization in the future?

Creating an efficient and robust withdrawal system for crypto assets

In any retail-facing crypto business, the withdrawal process is one of the most critical and active functions. Users rely on it to move their funds swiftly and securely, whether they’re making a purchase, sending money to a friend, or transferring assets to another account. When users deposit money into your crypto application, they expect to access and withdraw their funds easily whenever they need them.