Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What's new in Calico Enterprise 3.18: Major workload-centric WAF updates and more

This release, we’re really excited about major improvements to Calico’s workload-centric WAF. We’ve made it much easier for users to configure and deploy the WAF in just a few clicks and we’ve also made it much easier to review and manage WAF alerts through our new Security Events feature.

Move from a High-Cost Legacy SIEM to High-Speed Falcon LogScale

The fastest adversary can “break out” — or move laterally — in only seven minutes after compromising an endpoint. Yes, you heard that right. Seven minutes. In the relentless race against adversaries, every second counts. To avoid breaches, you need to detect and stop adversaries before they can break out and expand their realm of control.

What Is an Attack Surface?

An attack surface refers to all the possible points, also called attack vectors, where cybercriminals can access a system and steal data. When an attack surface is small, it’s easier to manage and protect, making it essential to reduce your attack surface as much as possible. Continue reading to learn more about attack surfaces and how you can reduce your organization’s attack surface by following a few of our tips.

Federal Agencies Face 9/30/23 Deadline to Submit Detailed Plan for Implementing 2021 Cybersecurity Executive Order

In mid-August, U.S. national security advisor Jake Sullivan sent a memo to cabinet secretaries of agencies outside the Pentagon dinging them for not complying with deadlines and steps in the 2021 Executive Order 14208 on Improving the Nation’s Cybersecurity. In doing so, he set a new timeclock ticking for submitting a detailed implementation plan by the end of September… just a few weeks away from this writing.

Protect Against HTTP Attacks with HTTPS Strict Transport Policy

Web communications can be routed over the Hypertext Transfer Protocol (HTTP) and the Hypertext Transfer Protocol Secure (HTTPS). The latter ensures encrypted data transfer between a website and a user. Some sites will offer both HTTP and HTTPS connections, but any HTTP connection may be vulnerable to cyber attacks. To require that all connections route over HTTPS, you can set up an HTTPS Strict Transport Policy (HSTS) to enforce secure connections.

Over 700K Indiana Medicaid Recipients Exposed in Data Breach

The Indiana Medicaid program helps state residents who fall into a lower income bracket. These individuals use the program to obtain medical care. To qualify for the program, individuals must present their financial statements and other personal data to the government organization. Some or all of this data could be at risk if the organization is compromised. After learning the Medicaid program was compromised, we were concerned about all the individuals that could be impacted.

Power of AI: Your InfoSec Professional's Trusty Sidekick

Ever wondered what the future of information security looks like? 🤖🔐 In this video, we're diving deep into the concept of having an AI companion for your InfoSec professional. Picture it: Your InfoSec expert is the brains of the operation, making all the critical decisions to keep your data safe. But right there on their shoulder is a trusty AI sidekick, analyzing mountains of data faster than you can blink and serving up all the info needed for those informed decisions.

Coffee Talk with SURGe: The Interview Series featuring Jamie Williams

Join Ryan Kovar and special guest Jamie Williams, MITRE ATT&CK for Enterprise Lead and Principal Adversary Emulation Engineer, for a discussion about MITRE ATT&CK use cases and Jamie's essay in a new book by SURGe titled, "Bluenomicon: The Network Defender's Compendium.".