Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

GSEC vs. CompTIA Security - Certification Comparison

Cybersecurity professionals play an increasingly crucial role in protecting sensitive information and securing networks against evolving threats. Cybersecurity certifications validate an individual’s knowledge and skills, enhancing career prospects and credibility in the field. CompTIA Security+ and GIAC Security Essentials (GSEC) are two highly valued certifications: Read on for a detailed comparison of the two certifications to help you determine the right option for your career.

Is Enterprise Risk Posture Better or Worse Today?

Measuring enterprise risk posture—its overall security readiness and resilience—is a complex challenge. Advanced security solutions, such as automated vulnerability management tools and unified risk dashboards, enable organizations to defend their networks with unprecedented efficiency. The rapid expansion of cloud environments and the intricacies of modern IT infrastructures, however, present an increasingly dynamic attack surface.

Self-Proclaimed "BianLian Group" Uses Physical Mail to Extort Organizations

On or around February 25, 2025, a threat actor claiming to be associated with the BianLian ransomware group began using the United States Postal Service (USPS) to send physical ransom letters to executives, primarily within the US healthcare sector. Notably, when compared with historical BianLian communications and ransom notes, the physical ransom letters are drastically different in word usage and tone.

Three VMware Zero-Days Exploited in the Wild Patched by Broadcom

On March 4, 2025, Broadcom released patches for three zero-day vulnerabilities exploited in the wild, affecting ESXi, Workstation, and Fusion. These vulnerabilities, discovered by Microsoft, range in severity from high to critical. Details of the exploitation have not been revealed at this time, and Arctic Wolf has not identified a public Proof-of-Concept (PoC) exploit.

Schools in Session: Surge in Phishing Attacks Targeting the Education Sector

KnowBe4’s Threat Lab recently observed a phishing campaign targeting educational institutions. Over a 30 day period, 4,361 threats were reported, originating from 40 unique sender domains. 65% of these domains were compromised educational institution IDs. The ultimate aim of these attacks was to harvest credentials resulting in the potential data loss, compromise and further phishing emails.

Effective Runtime Security in Containerized Environments

Runtime security is all about real-time protection, actively monitoring and responding to threats as they happen, not just hardening, setting up barriers or reacting to attacks after the fact. Think of it this way: traditional security measures prevent most intruders, but what about the ones that manage to get in? Runtime security alerts you to any suspicious activity and takes immediate action to stop it. Why is this so important for containers?

What is Disinformation Security?

In an era of AI-generated content, deepfakes, and manipulated media, disinformation is no longer just a concern for governments and social media platforms – it’s a cybersecurity threat. According to Gartner’s 2025 trend forecast, disinformation security will be a key focus area as AI-generated content, deepfakes, and synthetic media continue to challenge digital trust. But what exactly is disinformation security, and why has Gartner identified it as a critical business risk?

Why API Discovery Is Critical to Security

For Star Trek fans, space may be the final frontier, but in security, discovering Application Programming Interfaces (APIs) could be the technology equivalent. In the iconic episode “The Trouble with Tribbles,” the legendary starship Enterprise discovers a space station that becomes overwhelmed by little fluffy, purring, rapidly reproducing creatures called “tribbles.” In a modern IT department, APIs can be viewed as the digital tribble overwhelming security teams.

Modern Storage Meets Cyber Resilience: The Rubrik and Pure Storage Solution Architecture for Unstructured Data

Additional contributor: Dan Kogan, VP of Enterprise Growth and Solutions at Pure Storage Rubrik and Pure Storage have partnered to deliver a reference architecture solution that enables organizations to unify, manage, and secure unstructured data at scale. According to projections from UBS, data volumes will reach as much as 660 zettabytes—or 129GB per person on Earth—by 2030.