Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

FAQ: What Steps Can You Take to Speed Up ISO 27001?

ISO 27001 is one of the most important security frameworks in the world. Any business that wants to operate internationally, especially if they have contracts with certified brands or international governments, or they want to open the door to those contracts, will need to achieve ISO 27001 certification. There’s just one problem: it can take a long time to achieve. How long?

How to Combat Alert Fatigue to Retain and Empower Your Security Teams

In the high-stakes world of cybersecurity, organizations must ensure that their teams not only protect the organization but also stay motivated and productive. One of the most insidious threats to achieving this goal is alert fatigue. When analysts are bombarded with thousands of security alerts daily, they risk becoming overwhelmed and disillusioned in their roles.

Privileged Access for Modern Infrastructure: The Top Four Challenges

As organizations have transitioned from legacy IT infrastructure to cloud-native, ephemeral modern infrastructure, the needs of how privileged access is handled have shifted, too. Modern infrastructure presents unique challenges that legacy Privileged Access Management (PAM) tools, originally architected for more static environments, weren’t designed to handle. In this post, we explore why characteristics of modern infrastructure require a modern approach to PAM.

CosmicSting: A Critical XXE Vulnerability in Adobe Commerce and Magento (CVE-2024-34102)

The e-commerce world was recently shaken by the discovery of a vulnerability in Adobe Commerce and Magento, two of the most widely used e-commerce platforms. Dubbed "CosmicSting" and designated as CVE-2024-34102, this vulnerability exposes millions of online stores to potential remote code execution and data exfiltration risks.

Water Barghest: A Stark Reminder of IoT Security Gaps

Trend Micro’s recent report on the Water Barghest threat actor underlines a critical issue that has long plagued the IoT ecosystem: the security shortcomings inherent in many connected devices. With over 20,000 IoT devices compromised and exploited as residential proxies within minutes, this story highlights the growing risks posed by insecure IoT devices and the urgent need for proactive security measures.

Bypassing the Bypass: Detecting Okta Classic Application Sign-On Policy Evasion

In September 27, 2024, Okta disclosed a critical vulnerability affecting their Classic environment that created a concerning security gap in identity protection. The vulnerability, active since July 17, 2024, allowed attackers with valid credentials to bypass application-specific sign-on policies by simply modifying their user-agent string.

4 tips to encourage your team to use 1Password Enterprise Password Manager

So you’ve rolled out 1Password Enterprise Password Manager, successfully onboarded your team – now what? Don’t let the momentum you’ve built go to waste! By building long-term security habits early on you’ll reap the benefits far into the future.

Security Bulletin: PAN-OS Authentication Bypass and Privilege Escalation Vulnerabilities

On November 19, 2024, Palo Alto Networks disclosed two critical vulnerabilities in its PAN-OS software, CVE-2024-0012 an Authentication Bypas, and CVE-2024-9474 a Privilege Escalation. These vulnerabilities enable attackers to gain unauthorized administrative access and escalate privileges to root level. Exploitation of these vulnerabilities, observed in the wild, has been attributed to a targeted campaign dubbed Operation Lunar Peek.

GDPR and CPRA: A Unified Call for Data Transparency and Accountability

The General Data Protection Regulation (GDPR) of the European Union and the California Privacy Rights Act (CPRA) represent landmark regulations designed to protect consumer data privacy. While GDPR became enforceable in May 2018, CPRA came into effect in January 2023, building on its predecessor, the California Consumer Privacy Act (CCPA). Both laws aim to empower individuals with greater control over their personal data while imposing rigorous obligations on businesses.

Integrating SASE and NDR: Building a Robust Security Framework

Secure Access Service Edge (SASE) is a holistic security model that integrates both networking and security functions into a single, cloud-native architecture. SASE security combines secure network access, SASE cloud security and zero-trust technologies to create a unified approach to protecting the enterprise networks of today. SASE can be extremely useful especially for organizations adopting digital transformation and remote work. Some of the SASE benefits are.