Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Personal Data and PII: A Guide to Data Privacy Under GDPR

Data privacy under GDPR is crucial in today's digital age. With increasing data breaches, understanding and protecting personal information is vital. The General Data Protection Regulation (GDPR) plays a significant role in safeguarding personal data and Personally Identifiable Information (PII). GDPR, implemented in 2018, sets strict guidelines on data protection for individuals within the EU.

How I Use a Password Manager as a College Student

Since starting my internship at Keeper Security, I’ve had the opportunity to enter into the world of cybersecurity, particularly surrounding the role of password management. This eye-opening experience has not only educated me on the dangers of an unprotected online presence, but it’s also encouraged me to follow cybersecurity best practices in my personal and academic life.

Embracing Observability Tools to Empower Security Incident Response

Companies spend a huge amount of their budget trying to build, manage, and protect cloud environments. Since there is no industry standard for sharing data feeds between development and security, each team is on an island trying to figure out how to keep their side of the room clean. The most robust security incident response teams understand the incredible value of using observability telemetry for security workflows, but are unsure how to make it happen in practice.

Sysdig Sage: A groundbreaking AI security analyst

Generative AI (GenAI) is a top priority for organizations looking to increase productivity and solve business problems faster. In cloud security, AI chatbots to aid security practitioners are becoming more common, but to date, most of these solutions offer only basic queries and summarization. Diverse cloud environments and evolving threats require more from an AI security analyst.

Are Ransomware Attacks Still a Growing Threat in 2024?

Ransomware attacks continue to pose a growing threat to organizations as it has emerged as the number one threat, affecting 66% of organizations in 2023 and pulling over $1 billion from the victims. These attacks have increased in frequency and sophistication, resulting in significant financial loss, operation disruption, theft of sensitive data, and reduced productivity rates. Also, it damages the organization's reputation and results in the loss of customer trust and compliance violations.

10 Testing Techniques Every UX/UI Designer Should Know

When designing digital products like websites, applications, software, and the like, one of the most crucial factors to take into account is user experience (UX) and user interface (UI) design. To ensure that their products are user-friendly and satisfy the needs of their intended audience, designers employ testing strategies during the design process. If you're new to the designing process or even have some experience, these ten testing techniques will help you enhance your design process.

Advanced Network Device Scanning Techniques with Total Network Inventory (TNI)

In network management, the ability to efficiently scan network for devices is crucial for maintaining security, optimizing performance, and ensuring effective asset management. Total Network Inventory (TNI) offers a range of methods to scan network devices.

Understanding Prompt Injection: A Growing Concern in AI and LLM

Artificial Intelligence (AI) and Large Language Models (LLM) have revolutionized numerous industries, from healthcare to finance. However, with this rapid adoption comes new risks, one of which is prompt injection. This emerging threat has significant implications for the security, ethics, and reliability of AI systems.

Updates to the CRQ Platform: ISO 27001 Mapping and Model Calibration

‍ ‍ ‍One of the most simultaneously exciting and challenging aspects of working in the cybersecurity industry is that the risk landscape and management practices never stop evolving. Additional data is continuously being gathered, and new frameworks are constantly developed to help organizations better assess, measure, and secure themselves against threat actors poised to exploit system weaknesses.