Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

CrowdStrike Sets Speed Benchmark with Fastest-Ever Threat Detection in MITRE Engenuity ATT&CK Evaluations: Managed Services, Round 2

Security teams must outpace increasingly fast and sophisticated adversaries to stay ahead. In the most recent closed-book MITRE Engenuity ATT&CK Evaluations: Managed Services, the CrowdStrike Falcon platform once again demonstrated it stands alone in its ability to deliver the speed and efficacy needed to stop breaches.

3 Challenges with Traditional Spec Reviews and 1 Extraordinarily Simple Solution

Speaking from experience, reviewing a construction specification might be one of the least fun activities for any construction or design professional. We got into the industry because we are passionate about building cool things, not because we like reading several hundred pages of technical language. And what makes it worse is that only a few bullet points out of the entire document can really impact your scope of work. This is why Egnyte created Smart Spec.

Helping Smaller Reporting Companies Adhere to 8-K Regulations With CRQ

In March 2022, when the not-so-new-anymore SEC cybersecurity regulations were initially drafted, some argued that smaller reporting companies, defined by having a public float of less than $250 million or an annual revenue of less than $100 million, should be exempt, given the "outsized costs" they faced. Others proposed that these smaller organizations should have a longer disclosure deadline, helping to alleviate the chances of non-compliance.

Drata Integration - How to Automate Technical Vulnerability Management

Aikido Security is now live on the Drata Integration marketplace! That’s great news because navigating today’s cybersecurity regulatory landscape is a bit like walking a tightrope in a hurricane. As cyber threats evolve, so do the regulations designed to keep them in check. Businesses now find themselves grappling with a growing list of compliance requirements, each more stringent than the last.

What is Glupteba and how can you protect your customers from this malware?

Over time, cybercriminals find ways to exploit new cybersecurity breaches, leading to the creation of malware that compromises users' security. Every year, one or more malware variants stand out as new, evasive, or dangerous. According to our Internet Security Report (ISR), last year it was Glupteba.

Getting Started with Microsoft 365 Security and Compliance

In 2022, Microsoft rebranded its compliance and risk management tools under the name Microsoft Purview. Microsoft Purview provides a wealth of valuable functionality, including capabilities formerly provided by tools like Office 365 Security and Compliance, Microsoft 365 Security Center and Microsoft Compliance Manager.

Never Miss a Critical Alert: Graylog 6.0 Elevates Security Alerting with Pushover Integration

Responding rapidly to cyber threats is a make-or-break capability in today’s high-stakes security environment. A missed alert can quickly escalate a minor incident into a major crisis, jeopardizing your organization’s critical assets and hard-earned reputation. A recent IBM study revealed that companies took an average of 237 days to identify a data breach in 2021 — an inexcusable delay that could invite catastrophic consequences. (Source: IBM Cost of a Data Breach Report 2022)

Beyond Detection: The Rise of Legitimate Software Abuse in Malware Attacks

Cybersecurity researchers have identified an increasing trend where threat actors are abusing legitimate and commercially available packer software, such as BoxedApp, to evade detection and distribute malware, including remote access trojans and information stealers. Targeted Industries and Geographical Spread According to Check Point security researcher Jiri Vinopal, the majority of malicious samples have targeted financial institutions and government sectors.

Inherent Data Leakage in Microsoft Fabric Business-Led Development

Microsoft Fabric is an end-to-end analytics and data platform that covers a wide range of functionality, including data movement, processing, ingestion, transformation, real-time event routing, and report building. The platform allows business users of all technical backgrounds to create, process, and store data and build powerful business tools from a unified platform.