Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

KnowBe4 Named a Leader in the Summer 2024 G2 Grid Report for Security Orchestration, Automation, and Response (SOAR) Software

We are excited to announce that KnowBe4 has been named a leader in the Summer 2024 G2 Grid Report for Security Orchestration, Automation, and Response (SOAR) for the PhishER platform for the 13th consecutive quarter! The latest G2 Grid Report compares Security Orchestration, Automation, and Response (SOAR) Software vendors based on user reviews, customer satisfaction, popularity and market presence. Based on 305 G2 customer reviews, KnowBe4’s PhishER platform is the top ranked SOAR software.

Encryption at rest in Elastic Cloud: Bring your own key with AWS KMS

In the previous blog of this series, we unpacked the foundational concepts of encryption at rest and introduced you to Elastic Cloud’s “bring your own key” (BYOK) feature, which allows you to do encryption at rest with encryption keys managed by the KMS service of your cloud provider.

How CISOs Should Handle Future CrowdStrike-type Breaches

SolarWinds, MOVEit, Knight Capital, and now CrowdStrike. The vendor ecosystem will remain a major playing field for operational disruptions. But are you ready for the next inevitable event? As a CISO, your response to such a question from the board shouldn't be anything less than a resounding "Yes!" Here are five plans of action to help your organization survive the next major IT quake, whether it's due to another rusty security update or a third-party breach.

Data Loss Prevention Strategy: From Reactive to Proactive

In today’s data-driven world, safeguarding sensitive information is paramount. A well-crafted Data Loss Prevention (DLP) strategy acts as a shield, protecting your organization from costly data breaches and reputational damage and ensuring you meet regulatory requirements. Following a step-by-step guide ensures you cover all the essential bases, from selecting a loss prevention policy that aligns with your needs to conducting regular security audits.

Privileged User Monitoring: Defending Against Insider Risks

Organizations are increasingly reliant on complex systems and vast amounts of sensitive data, which makes them attractive targets for cybercriminals. However, while external threats are often in the spotlight, insider risks posed by privileged users who have elevated access to critical systems and sensitive information often goes unnoticed.

What is an account takeover?

Whether you’re a Halloween or comic con fan, dressing up as your favorite character is something you’ve probably done at least once in your life. As a kid, you were excited to put on that flimsy Batman mask and cape, thinking you looked just like the hero you saw on the movie screen. As an adult, getting or making the most move-accurate costume may allow other people to think that you are the actor in disguise.

$75 Million Record-Breaking Ransom Paid To Cybercriminals, Say Researchers

The staggering sum of US $75 million has reportedly been paid to a ransomware gang in what is believed to be the largest known ransom payment made by a cyber attack victim since records began. Researchers at Zscaler claim in a new report that the record-breaking figure was paid by an undisclosed Fortune 50 company to the Dark Angels ransomware group.

The Future of Truck Accident Law

In transportation, truck accident law is set to undergo massive changes. As technology progresses and society redefines norms, the legal structure that oversees truck mishaps should shift; it ought to adapt in order to guarantee safety for all those concerned, equity, and justice. The future of truck accident law will be influenced by various factors. Innovation in vehicle technology plus adjustments of policy from regulators and the attitude of society towards road safety.