Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

Introducing Astra OrbitX: Continuous Security at Scale

Engineering Leaders are stretched thinner than ever, racing to deliver innovative products and scale operations while securing a complex digital ecosystem across the increasing perimeter of code, DevOps, compliance, and more. Remember the infamous MOVEit attacks that compromised nearly 2,000 organizations, from BBC and Harvard to local government agencies. Over 67 million individuals were affected, underscoring the devastating consequences of such breaches.

CIO POV: Impactful AI Programs Start with 'Why'

Generative AI (GenAI) has the power to transform organizations from the inside out. Yet many organizations are struggling to prove the value of their GenAI investments after the initial push to deploy models. “At least 30% of GenAI projects will be abandoned after proof of concept by the end of 2025, due to poor data quality, inadequate risk controls, escalating costs or unclear business value,” according to Gartner, Inc.

Elastic named a Leader in IDC MarketScape: Worldwide SIEM for Enterprise 2024

Elastic has been recognized as a Leader in the IDC MarketScape for Worldwide SIEM for Enterprise 2024 Vendor Assessment. Elastic Security modernizes threat detection, investigation, and response with AI-driven security analytics — the future of SIEM. It is the tool of choice for SOC teams because it eliminates blind spots, boosts practitioner productivity, and accelerates SecOps workflows.

Nightfall AI Honored as Winner of the 2024 SC Awards

San Francisco, California, September 18, 2024 — Nightfall AI has been named a winner in the prestigious 2024 SC Awards. Nightfall has been recognized in the Best Data Security Solution and Best Insider Threat Solution categories, underscoring their team’s commitment to excellence and leadership in the cybersecurity industry. View the full list of 2024 SC Awards winners here.

How to Implement Scalable Access Controls with RBAC: Best Practices for Zero Trust Environments

In the arms race to secure environments, codifying permissions often becomes an afterthought in the wake of setting up a new access tool. I often speak with organizations that either don’t know who has permission to what, or have no permission definitions at all. I once onboarded an enterprise level digital communications company that was losing productivity trying to keep track of who had access to their Kubernetes resources.

NESA Standard Ensures Security of UAE's Cyberspace

To allay dependence on oil revenue and expand the private sector, the United Arab Emirates (UAE) has committed, in recent years, to establishing a knowledge-based economy. Consequently, they have become a formidable competitor in Information Communication Technology (ICT). As the ICT industry has grown, so have government agencies to regulate it, namely the Signals Intelligence Agency, formerly known as (and often still referred to as) the National Electronic Security Authority (NESA).

The Role of Zero Trust Architecture in Enhancing SSO Security

Securing virtual identities and entry points has become a critical priority as cyber threats grow more sophisticated. A Single Sign-On (SSO) system offers ease and allows multi-functionality with a single set of identity verification, but they are enticing targets for cyber attackers. Organizations need Zero Trust Architecture to alleviate this risk. Zero Trust Architecture (ZTA) is a protection framework that is designed on the principle of never trust and always verify.

Leveraging Cyber Risk Quantification for NIS2 Compliance

‍In response to the growing number of disparate cyber regulations across its member states, resulting in inconsistent cybersecurity practices, the EU drafted Directive 2022/2555, more commonly known as NIS 2. This sweeping directive, officially in effect in October 2024, aims to ensure a more uniform, proactive approach to cyber risk management across the union in the face of an interdependent market and increasingly costly risk landscape.

CrowdStrike Drives Cybersecurity Forward with New Innovations Spanning AI, Cloud, Next-Gen SIEM and Identity Protection

Today’s threat landscape is defined by adversaries’ increasing speed and quickly evolving tactics. Now more than ever, it is imperative organizations unify and accelerate their security operations to detect, identify and respond to threats at the rapid pace of the adversary. This isn’t always straightforward.