Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Trustwave Recognized as a Leader in IDC MarketScape: Asia/Pacific Managed Security Services

Trustwave has been named as a Leader the IDC MarketScape: Asia/Pacific Managed Security Services 2022 Vendor Assessment (doc #AP4910122e, October 2022). According to the IDC MarketScape, “Trustwave has been aggressively working with enterprises and midmarket customers to offer effective MDR services that are easy and simple to implement with affordable pricing options.”

Hackathon! How can blockchain solve supply chain visibility challenges?

PA Consulting recently joined forces with RKVST to host a Hackathon, looking to identify new and innovative propositions for digital supply chains. Could the teams of PA consultants and analysts identify opportunities to help their clients using RKVST technology? Short answer: YES! Many of today’s business challenges can be addressed with a reliable evidence ledger. If you want the long answer, read on.

Defining Autonomous SOC: How Tomorrow's SOC will Augment Analysts

It’s an ever-changing and ever-evolving threat landscape out there today. Bad actors are smarter, more sophisticated, and better at evading detection. Security teams are also facing a barrage of overwhelming information, continually expanding the stream of alerts that must be reviewed, triaged and investigated.

Devo Enters a Strategic Collaboration Agreement with Amazon Web Services: What It Is and How It Benefits Customers

Devo recently announced that it has entered into a strategic collaboration agreement with Amazon Web Services (AWS). This is a significant milestone for Devo and great news for our mutual customers with AWS. We caught up with Tony Le, cloud partnerships director, to take a deeper dive into what this means and how the collaboration will benefit our users in the long run.

Extortion in Cloud Storage

Extortion can simply be defined as “the practice of obtaining benefit through coercion.“ Data and cloud extortion schemes occur when precious data and/or access is stolen by an attacker that promises to restore it through payment or other demands. In this article, we’ll cover some common or uncommon extortion schemes, and highlight ways to detect and avoid falling prey to demands.

How to Migrate Snyk to the new Bitbucket Cloud App Integration

Snyk has a new and improved Bitbucket Cloud App. The new Snyk Security for Bitbucket Cloud App features the same Bitbucket experience with a streamlined onboarding process and improved enterprise functionality. Here's how to migrate your existing Snyk as Bitbucket Cloud App (Legacy)—to the new Bitbucket Cloud App integration.

Test Drive Netskope Private Access: A Modern ZTNA Solution

We are pleased to announce that Netskope Private Access (NPA) is now available to test drive, meaning you can experience a truly modern zero trust network access (ZTNA) solution firsthand with no commitment and no software to download or install. Selecting and implementing the right ZTNA solution is a crucial part of the SASE journey, and our goal is to make your process of evaluating Netskope Private Access as easy as possible.

Up Level Your Amazon Security Lake with Attack Surface Intelligence

As global network infrastructure expands to include devices without traditional compute power, every organization’s attack surface becomes increasingly complex. Parallel to the increased complexity in the threat landscape is the increased scale and complexity of the signals and data necessary to produce meaningful cybersecurity insights. At its core, cybersecurity is a big data problem, requiring centralization of disparate data sources in uniform structure to enable continuous analytics.

OT:ICEFALL Continues: Vedere Labs Discloses Three New Vulnerabilities Affecting OT Products - How to Mitigate

Continuing our OT:ICEFALL research, Vedere Labs has disclosed three new vulnerabilities affecting OT products from two German vendors: Festo automation controllers and the CODESYS runtime, which is used by hundreds of device manufacturers in different industrial sectors, including Festo.

Thinking of a SecOps Platform? Showing ROI Just Got Easier

As threats have continued to evolve, enterprises have made significant investments in security infrastructure and security operations is maturing. C-Suites and Boards are increasingly involved in security decision making and studies show that they are doubling down on security investments, which are expected to grow from $262.4 billion in 2021 to $458.9 billion in 2025.