Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Responding to CVE-2024-3094 - Supply chain compromise of XZ Utils

It seems as though responders cannot catch a break when it comes to 0-day vulnerabilities and supply chain compromise avenues. On March 29th, 2024, the Cybersecurity & Infrastructure Security Agency published an alert regarding a supply chain compromise of the XZ Utils package. At time of writing, there is no information regarding exploitation of the vulnerability and follow-on post-compromise activity.

BDRSuite Recognized as a "Leader" and "High Performer" in Backup Category - G2 Spring 2024 Report

BDRSuite Recognized as a “Leader” and “High Performer” in Backup Category – G2 Spring 2024 Report We are happy to announce that the BDRSuite has been awarded with multiple G2 Awards/Badges in the G2 Spring 2024 Grid Report. G2 is a well known technology review platform, that offers valuable insights and user opinions to help businesses in making informed decisions while choosing softwares and services.

Microsoft Azure Red Hat OpenShift (ARO) and Trilio Data Protection: Uniting Cloud-Native Excellence

With the exponential growth of cloud adoption and the widespread shift to Kubernetes as the de facto orchestration platform, Red Hat OpenShift emerges as a leading solution. Coupled with the robust cloud infrastructure of Microsoft Azure, Red Hat OpenShift on Azure (ARO) is a managed service that offers OpenShift clusters on Microsoft Azure. It is jointly engineered and operated by Microsoft and Red Hat with an integrated support experience.

Securing CI/CD Runners through eBPF

During the Open Security Summit 2024, Yahoo! Principal Security Engineer Mert Coskuner and Kondukto CEO & Co-Founder Cenk Kalpakoglu delved into the intriguing topic of securing CI Runners through eBPF agents. Although the title might seem unconventional, it reflects their creative approach to solving security challenges in continuous integration environments. With the rapid digital transformation of businesses, there has been an increasing focus on supply chain attacks and their impact on security.

What is the Health Records and Information Privacy Act 2002 (HRIPA)?

The Health Records and Information Privacy Act 2002 (HRIPA) is a comprehensive legislation established to protect the privacy and security of health information in New South Wales (NSW), Australia. This legislative framework shares many similarities with the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule in the United States in their goals to ensure data privacy, security, and handling of health information in the healthcare sector.

Why You Should Use a Password Manager in 2024

You should use a password manager in 2024 because a password manager protects your login credentials and keeps your online data safe. Password managers do more than just protect and store passwords; they also store your passkeys, generate new, strong passwords, and let you store and securely share important documents such as medical records, identification cards, credit cards and more. Continue reading to learn why using a password manager is important in 2024 and the risks associated with not using one.

(Re)Discover the Hidden Value of Single Sign-On

Modern zero trust is an information security model that denies users and devices access to applications, data, networks, and workloads by default. One of the optimal ways to help reduce credential-based attacks with applications is to leverage single sign-on (SSO) as part of your access management strategy. SSO combines simplicity with security by removing friction for users to access applications and reducing the administrative overhead and risks for IT associated with password management.

Trustwave Embarks on an Extended Partnership with Microsoft Copilot for Security

Trustwave today announced it will offer clients expert guidance on implementing and fully leveraging the just-released Microsoft Copilot for Security, a generative AI-powered security solution that helps increase the efficiency and capabilities of defenders to improve security outcomes.