Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

What Are Hardware and Software Keyloggers? How Can You Spot and Prevent Them?

In this video, learn what hardware and software keyloggers are, signs you may have one, how to prevent them, and more. Learn more about: Resources and social media: Transcript: Do you remember every key you pressed on your laptop today? Every word you typed in an email? Every password you punched in? Every digit you entered for your credit card? For you and me, recalling all that information is next to impossible. But not for a Keylogger.

How to Delete Files in PowerShell with Remove-Item

Managing files and directories is a common task in computing, especially in the Windows PowerShell environment. The Remove-Item in PowerShell is a key cmdlet for deleting files and directories, as well as other types of items in PowerShell. Remove-Item can be used for local file systems as well as other PowerShell providers like the Registry, Certificate Store, and Environment variables.

Cybersecurity Awareness Month: Adding Seasonal Spice to Managed Detection and Response (MDR)

It’s Cybersecurity Awareness Month and you know what that means. Pumpkin spice versions of Trustwave Managed Detection and Response (MDR) solutions are now available! Well, not really, but pumpkin spice season is the perfect time to raise awareness about the importance of cybersecurity and ensuring that individuals and organizations are equipped to protect themselves against cyber threats.

The Results from Dreamforce are In: Salesforce Users Love Rubrik

Dreamforce 2024 once again proved to be a monumental event, with major AI advancements, product announcements, and keynotes that inspired the entire tech community. Among the highlights, Salesforce's introduction of Agentforce took center stage, offering businesses the ability to deploy autonomous AI agents that optimize customer interactions and streamline operations.

CyberRisk Alliance: JFrog Field CISO Paul Davis on Securing Software in Today's Threat Landscape

In this executive interview with CyberRisk Alliance, JFrog’s Field CISO, Paul Davis, discusses the growing challenges of securing development workflows and the evolving role of the CISO. With an increasing focus on information security, Paul shares insights on balancing development speed with the need for robust security in today’s software environments.

Securing our world: Cybersecurity Awareness Month 2024

October marks Cybersecurity Awareness Month. This is a time to focus on the critical importance of cybersecurity and provide individuals and organizations with simple, effective tools to stay safe online and protect personal information. Increased awareness and taking appropriate actions are fundamental to a more secure digital work environment. The theme for this year, “Secure Our World,” emphasizes that cybersecurity is a shared responsibility.

GigaOm Radar Report 2024: Insights on Continuous Vulnerability Management

As organizations face increasingly sophisticated cyber threats, the importance of Continuous Vulnerability Management (CVM) continues to grow. GigaOm’s latest Radar Report for Continuous Vulnerability Management provides an in-depth analysis of the current landscape, offering a comprehensive look at the solutions and vendors leading the charge in this critical space. The report assesses a variety of platforms based on key criteria such as feature set, ease of use, performance, and innovation.

Anatomy of a Cyber Attack: The PAN-OS Firewall Zero-Day

On April 12, 2024, Palo Alto Networks published a security advisory detailing an actively exploited maximum severity zero-day vulnerability affecting the GlobalProtect feature of PAN-OS. Dubbed CVE-2024-3400, it was assigned the maximum critical severity score of 10.0 through the Common Vulnerability Scoring System (CVSS), meaning the potential for damage was large and the path to exploit was easy for cybercriminals.