Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Unlocking Efficiency: Building Automation in ThreatQ Threat Intelligence Platform

Staying ahead of evolving threats is crucial for organizations in all industries. Threat intelligence platforms ( TIPs) play a pivotal role in this endeavor, providing a centralized hub for collecting, analyzing, and disseminating threat intelligence. Introducing the ThreatQ Platform, purpose-built for threat detection and response. To further enhance its capabilities, organizations can leverage automation, streamlining processes and fortifying their cybersecurity posture.

Defending Against OAuth App-Based Attacks on Enterprise SaaS

The phenomenal growth in the adoption of software as a service (SaaS) has prompted enterprises of all sizes to move their critical data to SaaS-based applications. And as attackers tend to follow data to induce a breach, their new area of focus is enterprise SaaS. The recent Midnight Blizzard attack by nation-state actors clearly reinforces the fact that this trend has only just begun.

Teleport Starts Issuing CVEs

Teleport is an open source company. We develop in the open, including full disclosure of security issues in our changelogs and pull requests. We share our penetration tests and key compliance reports. Despite this, our communication to open source users and integration with automated security tooling needed improvement. We needed a standardized way to refer to our vulnerabilities so that when two people (or systems) talk about a vulnerability, they know they’re talking about the same thing.

Types of Privileged Accounts

Organizations separate access to specific data and administrative capabilities into different types of privileged accounts in order to securely run their operations. Some types of privileged accounts include domain administrator (admin) accounts, local admin accounts, privileged user accounts and emergency accounts. If not properly managed or secured, cybercriminals can gain unauthorized access to these privileged accounts and steal an organization’s sensitive data.

Malware Trends According to Our Internet Security Report

Malware attacks continue to be the order of the day for businesses. The adaptability of threats and the fact that new attack models spread almost daily mean they are still very much a concern among cybersecurity professionals. The rise of malicious threat actors seems unstoppable. According to Gartner, by 2025, 45% of organizations worldwide will have experienced attacks on their software, which represents a staggering 300% growth since 2021.

Short Staffed? Try Using SOAR to Augment Your Security Team

The tech world is grappling with an imbalance between skilled technical talent availability and demand, with far-reaching impacts. Combined with tightened budgets, staff shortages can leave your organization vulnerable to hacking and cyberattacks. Let’s look at just two of the industries being affected: higher education and state and local governments.

CRN Recognizes Trustwave as 2024 Top 100 Security MSP

For the fifth consecutive year, the leading channel publication CRN named Trustwave to its 2024 Managed Service Provider (MSP) 500 list in its Security 100 category. The Trustwave Global Channel Partner Program earned recognition for providing one of the industry's most extensive collections of security products and services. These offerings cater to enterprise requirements in threat detection and response, as well as vulnerability and risk management.

How Vulnerability Can Make You a Victim on Valentine's Day

According to Netskope’s recent “Year in Review” Cloud and Threat Report, the most common way cyber attackers gained access to organisations in 2023 was through social engineering. While a favourite tactic of cyber criminals, at its heart, social engineering isn’t about someone breaking code while hunched over a glowing keyboard. It relies on individual human vulnerability, tricking people into opening the door for the attacker to walk through.

ITAR Compliance: 8 Essential Facts for Business Regulations

When choosing to take up government contracts, most businesses face one of the common compliance frameworks for security. They need to climb the mountain to achieve compliance with a framework like CMMC, FedRAMP, or maybe something like HIPAA if they’re in the healthcare space. Relatively few need to comply with a more esoteric – and higher-intensity – framework known as ITAR. What is ITAR, and what do you need to know if you’re a business that needs to use it? Let’s dig in.