Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Cloudflare acquires BastionZero to extend Zero Trust access to IT infrastructure

We’re excited to announce that BastionZero, a Zero Trust infrastructure access platform, has joined Cloudflare. This acquisition extends our Zero Trust Network Access (ZTNA) flows with native access management for infrastructure like servers, Kubernetes clusters, and databases.

The Beatings Ransoms Will Continue Until Morale Culture Improves

As we near the halfway point of 2024, it is apparent that the epidemic of extortionary cyber attacks will continue unabated into the foreseeable future. Now more than ever, I believe that until organizations adopt cultural approaches to cybersecurity, breaches will continue to wreak havoc on companies and industries. But why is this? There are far too many reasons to enumerate here, but in my experience the biggest factors are.

DNS, Powered by Intelligence: The Centripetal Advantage

We are trusted by the world’s most iconic brands with protecting their valuable business assets. Being named The Official Cyber Network Provider of The Boston Red Sox and Fenway Park demonstrates the importance for companies to adopt intelligence powered cybersecurity. When you have millions in revenue on the line like the Red Sox, you can’t afford to ignore intelligence.

Best Cybersecurity Practices for Mac Users

Сyberattacks and the threats they pose are becoming more complex every day. Therefore, no user, including Mac users, is immune to viruses, malware, and cyberаttacks. For a long time, Mac computers were thought to be less vulnеrable to such threats than Windows ones. But that does nоt mean they do nоt need reliable protection. After all, as mentioned above, nothing stands still and threats are also improving.

Here, There, Ransomware: The Surge of New Ransomware Groups

From late 2023 and into 2024, the ransomware ecosystem has become more diverse than ever, with an ever-expanding cast of extortion groups. Established players continue to compromise large companies globally, while smaller, newer groups are breaking into the scene with increasing frequency. From January to mid-May 2024 alone, 22 new ransomware groups emerged. In comparison, only 22 groups emerged during the entire two-and-a-half-year period between January 2018 and August 2020.

New CIP standards: Why utilities shouldn't wait to deploy

On May 9, the North American Electric Reliability Corporation (NERC) officially adopted new Critical Infrastructure Protection (CIP) requirements for Internal Network Security Monitoring (INSM). This is one of the last steps before Federal regulators make it an official standard for utilities and the electrical power grid industry. What does it mean? Compliance for CIP-015-1 is coming to your utility. Utilities will need monitoring tools with deep and wide asset intelligence and network control.

2024 Red Hat Summit with Exec Chair, David Safaii: Exciting Announcements, Exciting Problems on Everyone's Minds

The 2024 Red Hat Summit in Denver was a whirlwind of innovation, collaboration, and networking. The show kicked off with a great turnout for the Community and Red Hat OpenShift Days. The focus here was on Case Studies from and by End Users with production deployments of OpenShift sharing their use cases, insights into their workloads and lessons learned along the way.

AI Security Risks and Recommendations: Demystifying the AI Box of Magic

Explore Our Latest Insights on Artificial Intelligence (AI). Learn More. It is easy to assume that large language models (LLMs) and generative AI (GenAI) security products are a mysterious box of magic. While, in general, interactions with these models are abstract; you make an API call to a remote endpoint and receive a response without much exposure to the security controls around the model, there are security risks of AI to consider when using them.