Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Networks

Simplify SOC analyst experience with the enhanced Corelight Splunk App

Security operations centers (SOCs) play a vital role in detection, containment and mitigation of today’s advanced cyber attacks. SoC teams are also responsible for proactively hunting for threats, and improving the organization’s overall security posture. Modern SOC analysts struggle with alert fatigue.

Securing the unseen: MITRE's EMB3D framework for embedded devices

The security of embedded devices is in the news over the last few years, especially IoT assets and OT systems. From connected medical devices to industrial control systems to smartwatches and building automation, connected IoT devices will expand to over 25 billion by 2028.

Fast and Secure Hosting Solutions for Your Digital Needs

When it comes to a website's performance, security, reliability, and total maintenance costs, everyone needs good web hosting. However, choosing the best web host can be quite challenging, because there are so many possibilities and you may not be aware which one is the best. Luckily, this article will help you choose the best web host by explaining the various options, their benefits and drawbacks, and how to begin.

How To Know If An Online Transaction Is Secure Before You Pay

To determine whether an online transaction is secure, one must look for clear indicators such as a secure encrypted connection, a well-known payment gateway, and reliable payment options. This article will guide you through these essential signs to protect your personal information during online financial transactions.

ZTNA vs VPN: Decoding the Best Remote Work Security Option

While virtual private networks (VPNs) have been the go-to solution for remote access for decades, the surge in remote work during the pandemic has highlighted the cracks in its armor. Granting unrestricted access to everything stored within a corporate network can quickly become a security nightmare, especially as remote workers continue to rely on an increasing number of devices and access points.

Understanding Your Network's Security Posture: Vulnerability Scans, Penetration Tests, and Beyond

Organizations of all sizes need to be proactive in identifying and mitigating vulnerabilities in their networks. To help organizations better understand the value and process of a vulnerability scan, Trustwave’s Philip Pieterse, Managing Consultant for the Americas division of SpiderLabs and Dhervesh Singh, senior Security Consultant with SpiderLabs conducted a webinar exploring key offensive security testing methodologies: vulnerability scanning, penetration testing, and purple teaming.

Teaser. Half a Century of Connectivity: Celebrating 50 Years of TCP

In May 1974, 50 years ago, Vint Cerf and Bob Kahn made history with their paper on TCP (Transmission Control Protocol) published by @IEEEorg. Here is a teaser of a longer video (and "This Week in Net" episode) coming soon from our protocol experts, Mark Nottingham (Australia), and Lucas Pardue (UK).

Why an outdated router can compromise your company's security

In today's digital age, where interconnectivity is the norm, routers act as custodians of business information. These devices, which can sometimes be undervalued, control data traffic between our devices and the global network. However, recent events have highlighted vulnerabilities that may affect a large number of routers, raising concerns about the protection of sensitive information handled by enterprises.

Cato Networks' Impact and analysis of CVE-2024-3661 - "TunnelVision" VPN vulnerability

On May 6th, 2024, researchers from the Leviathan Security Group published an article detailing a technique to bypass most VPN applications, assigned as CVE-2024-3661 with a High CVSS score of 7.6. Researchers have labeled this technique ‘decloaking’ as while the VPN tunnel remains connected, it allows attackers to trick many VPN clients into sending traffic via a side channel and not through the encrypted tunnel.