Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How cloud engineering teams use Elastic Observability and Tines to optimize resources

Many of our customers use Tines and Elastic to scale security operations efforts, integrate context and data enrichment into alerts, and investigate and react to alerts faster. Today, we'll explore how these two platforms, working together, help cloud engineers drive cost savings for the organization, while maintaining optimal performance.

How Cloudflare Cloud Email Security protects against the evolving threat of QR phishing

In the ever-evolving landscape of cyber threats, a subtle yet potent form of phishing has emerged — quishing, short for QR phishing. It has been 30 years since the invention of QR codes, yet quishing still poses a significant risk, especially after the era of COVID, when QR codes became the norm to check statuses, register for events, and even order food.

State of DevSecOps

Shipping secure code rapidly and at scale is a challenge across the software industry, as evidenced by continued news of high-profile data breaches and critical vulnerabilities. To address this challenge, organizations are increasingly adopting DevSecOps, a practice in which application developers work closely alongside operations and security teams throughout the development life cycle.

EP 50 - Adversarial AI's Advance

In the 50th episode of the Trust Issues podcast, host David Puner interviews Justin Hutchens, an innovation principal at Trace3 and co-host of the Cyber Cognition podcast (along with CyberArk’s resident Technical Evangelist, White Hat Hacker and Transhuman Len Noe). They discuss the emergence and potential misuse of generative AI, especially natural language processing, for social engineering and adversarial hacking.

What Is PCI DSS And Why Is It Important?

The world is going cashless. The Federal Reserve Bank of San Francisco reported that cash was used in just 18% of all U.S. transactions in 2022. And that number will continue to decline. The widespread use of credit and debit cards, plus the rise of digital wallets and contactless payments, have reshaped the financial landscape in many wonderful ways — increasing flexibility as well as financial protection. However, it’s also increased the levels of fraud.

How to Migrate from VMware to OpenShift Virtualization - Step by Step Instructions

This blog provides detailed steps to show you how to move from VMware to Red Hat OpenShift Virtualization using Red Hat’s MTV Operator (Migration Toolkit for Virtualization Operator). To further help the reader, you can see a video of Trilio for OpenShift here Red Hat OpenShift Virtualization and KubeVirt Backup & Recovery with Trilio, and a whitepaper about Trilio VMware migration to OpenStack Technology-Driven VMware to OpenStack Migration: A Comprehensive Guide.

Behind the Screen: The Peril of Neglecting Mobile Apps

Everyone knows that running outdated computer applications comes with annoyances and risks. An outdated application might face performance issues or just become slower than modern versions. It might face compatibility issues and have limited functionalities. It might lose technical support and even fail to meet current industry standards and regulations, which could put your organization at risk for non-compliance penalties and legal action.

Ad Hoc Distributed Queries - SQL Server

An ad-hoc query is an unscheduled data inquiry, typically created in response to questions that cannot be addressed using predetermined or predefined datasets. Ad hoc distributed queries utilize the OPENROWSET(Transact-SQL) and OPENDATASOURCE(Transact-SQL) functions for establishing connections with remote data sources employing OLE DB. It’s advisable to employ OPENROWSET and OPENDATASOURCE solely for referencing OLE DB data sources that are accessed on an occasional basis.

UEBA vs. UBA: How They Differ & Which To Use

The financial repercussions of data breaches have soared, with organizations facing an average loss of $4.45 million per incident in 2023. However, beyond only financial implications, organizations that suffer a data breach face other severe consequences, including legal ramifications, productivity halts, and often worse, reputational damage amongst their clientele.