Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Quick start guide for using Calico policies for Calico Open Source users

Calico policies are a way to enforce network security at the pod level. This blog post will provide a comprehensive overview of Calico policies for Calico OS (Open Source) users. We will cover the basics of Calico policies, including what they are, how they work, and how to use them. We will also provide best practices for using Calico policies and examples of how they can be used in real-world scenarios.

AWS Resilience: 5 Key Strategies and Insights from an Opti9 Cloud Expert

In today’s era of digital transformation, organizations across the globe are under constant threat from a myriad of challenges ranging from cyber threats to human errors and natural disasters. Amazon Web Services (AWS) presents itself as a frontrunner in providing solutions to these challenges, but the true essence of resilience lies not just in adopting AWS, but harnessing its full potential.

The Complete System Hardening Guide

System hardening involves identifying and addressing security vulnerabilities across hardware, firmware, software, applications, passwords, and processes. Compatibility allows most applications to work smoothly, but securing a system requires additional steps known as system hardening best practices, which are crucial for protection against advanced threats. Microsoft emphasizes server security and provides comprehensive hardening techniques and best practices tailored to various platforms.

NIS2 vs SOC2 - Core Differences

The NIS2 Directive is the EU-wide legislation on cybersecurity that came into force in 2023, following rules introduced in 2016 (NIS). NIS2 expanded the scope of sectors and entities who need to (legally) comply with the framework. The increased scope aimed to cover the “most” critical sectors, which are vital for the economy and society, though are heavily reliant on IT.

Data Breach Prevention: Tactics, Techniques & Tools

Chances are, every single person who reads this article has experienced a type of data breach at least once: a phishing email that looked like a late bill fee that led to identity theft, an accidental email sent including proprietary company or customer data, a parent calling to ask if they should send money to a prince abroad (after the fact), or an open backpack that leads to the physical theft of a mobile device.

Unified Defense: The Importance of Security Operations Center Integration

As cyber threats continuously evolve, hackers are refining their attack tactics and the frequency of assaults. Over the past several years, 63% of Security Operations Center (SOC) analysts report the size of their attack surface has increased, according to Security Magazine. Similarly, our 2023 Threat Roundup research discovered the enterprise is experiencing 13 attacks every second.

LevelBlue Labs Discovers Highly Evasive, New Loader Targeting Chinese Organizations

LevelBlue Labs recently discovered a new highly evasive loader that is being delivered to specific targets through phishing attachments. A loader is a type of malware used to load second-stage payload malware onto a victim’s system. Due to the lack of previous samples observed in the wild, LevelBlue Labs has named this malware “SquidLoader,” given its clear efforts at decoy and evasion.

What is Continuous Penetration Testing: Benefits and Process

Today, we work in the cloud, connect through countless devices, and rely on ever-evolving software. While offering immense opportunities, this interconnected technology landscape exposes us to a relentless barrage of cyber threats. Malicious actors constantly seek new ways to breach our defences, exploiting vulnerabilities in systems we often take for granted.

Where Security Starts in Your Security Projects

The successful implementation of new tools and processes hinges not just on the technology itself but on meticulous project management. From ensuring secure access to the underlying infrastructure, a new tool will be implemented upon defining clear goals and understanding the security footprint of the service. Even the earliest steps of your rollout can be important in the long run.

Getting started with Continuous Threat Exposure Management (CTEM)

AI risk and security management is unsurprisingly Gartner’s number one strategic technology trend for 2024. But you might be less familiar with number two: Continuous Threat Exposure Management (CTEM). Coined by Gartner in 2022, CTEM isn’t just another buzzy acronym – it’s a powerful process that can help continuously manage cyber hygiene and risk across your online environment.