Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Customers Rate Sysdig 5 Out of 5 in Gartner Voice of the Customer for Cloud Security Posture Management Tools

As more and more workloads move to the cloud, the attack surface security teams need to secure has grown exponentially. To guard the massive perimeter of the cloud, you need to position your cloud infrastructure to be as safe as possible by default.

The Benefits of Cyber Security and AI

Artificial intelligence (AI) has revolutionised the field of cyber security, offering unparalleled advantages in detecting and preventing sophisticated cyber threats. From detecting anomalies in network behaviour to automating threat response, AI has become an indispensable tool for organisations looking to strengthen their defence against cyber-attacks.

Key Reasons Why Penetration Testing For Mobile Apps is Crucial for Enterprises

Mobile applications, commonly referred to as mobile apps, are software programs designed to run on mobile devices such as smartphones and tablets. These apps can provide users with a wide range of functionalities, from social networking and entertainment to productivity and e-commerce. With the rapid growth of mobile technology in recent years, businesses have increasingly turned to mobile apps as a way to connect with their customers and streamline their operations.

Understanding the RSA-based Marvin Attack

The Marvin Attack, named after the vulnerability it exploits, poses a significant threat to systems relying on RSA encryption and signing operations. It's a variation of the Bleichenbacher attack, which exploits errors in PKCS #1 v1.5 padding to perform adaptive-chosen ciphertext attacks. The attack leverages timing information obtained from RSA encryption or signing operations.

The Future of Kubernetes Network Policy

In the ever-changing world of Kubernetes security, it’s crucial to stay ahead of threats while maintaining operational efficiency. That’s why we’re excited to introduce our latest feature: Auto-Generated Kubernetes Network Policy, based on application runtime behavior, powered by eBPF (extended Berkeley Packet Filter) technology. With this addition, organizations can easily apply native Kubernetes network rules without worrying about disrupting their production systems.

Calculating the ROI of Effective Bot Management

Bots cost the average business 4.3% of online revenues every year – or $85 million for the typical enterprise – so it’s critical that businesses invest in finding the right bot protection solution. If you’re coming up against resistance within your business when seeking to procure or upgrade your bot protection capabilities, this post will give you plenty of ideas for proving why better bot management is essential – in ways that matter to everyone in your organization.

What Are The Risks of a Quantum Apocalypse, and Should We Worry?

Apocalypse now? Later? Will it ever happen? Computers can solve many problems in our day-to-day lives, making working remotely, storing files, and connecting with people from across the globe significantly easier. But has the development of computing technology gone too far? The potential of quantum computers may lead to technical breakthroughs in machine learning, science, and healthcare, but these powers may come at a cost. Current computer systems are far less powerful than quantum computers.

Netskope Cloud Exchange for Your Zero Trust Journey

Early in 2023 my colleague, and VP of Technology Integrations and Business Development, David Willis walked us through Realizing the True Power of Netskope Cloud Exchange. In the article, David painted the evolution of Cloud Exchange with a focus on how the Netskope Cloud Threat Exchange (CTE) module has matured since it was released.