Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

The Vital Role of Defensive AI: Safeguarding the Future

In recent times, the remarkable advancement of AI has revolutionized our technological landscape. Its profound benefits have not only enhanced the efficiency of our daily operations but also induced transformative shifts across industries. The impact of AI has made our lives more convenient, creating new opportunities in the digital world. Looking ahead, AI's influence promises a future full of innovation and potential.

WhatsApp Scams in 2024: How to Spot a Fake

Last year, text scammers prowling around on messaging platforms like WhatsApp sent a staggering 19 million messages in December alone. When ploys like these can rake up over $10 million in a matter of months, it’s easy to see why. Which WhatsApp messages are real this year, and which are not? With social engineering attacks, it's increasingly harder to tell. Here’s a look at the most probable WhatsApp scams in 2024 and what you can do to avoid them.

Building and managing malware analysis labs with Tines workflows

Understanding malware is essential to defending an organization against attacks. Analyzing suspicious applications helps us determine if an alert is a false positive, and the information discovered can be used to help remediate an incident or strengthen a system's defenses against further attacks.

Why we invested in Device Authority

Ten Eleven exists to provide high-value, cyber-focused counsel, capital, and connections to brilliant security entrepreneurs. We understand the unique problems security entrepreneurs face because we’ve been there and seen what makes the difference. One of the things that experienced cyber practitioners understand is how important it is to have technologies that work in the messy existing real world, not just green field new architectures.

Chinese Hackers Spy on Dutch Ministry of Defense: A Story of Alarming Cyber Espionage

In a revelation that adds yet another chapter to the ongoing saga of international cybersecurity threats, the Dutch Ministry of Defense recently shed light on a significant security breach. Reports that state-sponsored Chinese hackers have infiltrated the internal computer network the ministry uses were confirmed.

KuppingerCole Names Sysdig a Product and Innovation Leader for CNAPP

The cloud security market is still maturing and growing at a rapid pace. New security jargon, solutions, vendors, and acronyms are constantly appearing, making it difficult to have a clear sense of what approach to cloud security is best for your own organization. Cloud-native application platforms (CNAPPs) are one of the most recent categories in this space.

Can National Awareness Days Help Shift Attitudes To Internet Safety?

February brings a flurry of cybersecurity awareness days. On February 1st, Change Your Password Day reminded us that using “Rover123!” for yet another online account is not an appropriate defence between ourselves and cyber criminals, while yesterday—Safer Internet Day—encouraged us to take positive steps toward protecting ourselves online. But how long do these positive reminders last?

Product Quality at Rubrik - Part 2

In our previous blog, we discussed the importance of product quality, different types of testing we rely on at Rubrik, and how automated testing plays a pivotal role in ensuring quality of our products. Relying heavily on Unit, Component and Integration testing is important. But there will be code paths which we may not be able to cover using these types of tests. In the picture below, we can see a high-level view of our solution.

Cost-Effective Disaster Recovery for Wasabi and Veeam

In the IT industry, downtime is typically estimated at approximately $5,600 per minute, posing a significant threat to revenue, customer trust, and compliance. For SMBs, safeguarding data and ensuring business continuity are paramount for survival and competitiveness. A robust disaster recovery (DR) solution not only protects against threats like cyberattacks and hardware failures but also minimizes downtime, demonstrating reliability to customers and partners.