Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

CrowdStrike Receives High Scores in 2024 Gartner Critical Capabilities for Endpoint Protection Platforms Report

This week, Gartner released its 2024 Gartner Critical Capabilities Report for Endpoint Protection Platforms (EPP) as a companion to last month’s 2024 Gartner Magic Quadrant for Endpoint Protection Platforms. We’re proud to share that CrowdStrike received the highest score in both the Core Endpoint Protection and Managed Security Services Use Cases in the 2024 Gartner Critical Capabilities Report for Endpoint Protection Platforms for the second consecutive time.

Attack Vector vs Attack Surface

Attack vectors and attack surfaces are both critical concepts in cybersecurity, closely related yet distinct in their roles and implications. Understanding the similarities and differences between them is key to developing robust security strategies. This article will detail what both concepts involve, why they’re crucial, and methods your organization can conduct to enhance its current security posture.

Empowering Business-Led Innovation with Security at the Core

With AI moving faster than ever, businesses are embracing GenAI and Agentic AI to supercharge their development processes, enabling both technical and non-technical users to build, innovate, and automate. However, the need for security in this space has never been more critical. That’s where Zenity comes in and why I’m so excited to join the company, especially at a time of immense growth and expansion given our recent Series B funding.

Start strong: How CISOs make an impact from Day 1

CISO is a high-profile position with high expectations – and the impact clock starts ticking day 1. At Cato, we’ve had thousands of conversations with CISOs from companies of all sizes across different industries – learning about what works, what doesn’t, and the strategies that boost proactive, visionary leadership. This blog post, along with the eBook 30-60-90 Day CISO: Mastering the IT Security Game, is rooted in that collective wisdom.

Tines named a Leader and Outperformer in the GigaOm Radar Report for SOAR

We’re excited to share that Tines has been named a Leader and Outperformer in GigaOm’s Radar Report for Security Orchestration, Automation and Response (SOAR). We were the only vendor to secure scores of 4 (superior) or 5 (exceptional) in all evaluated categories, including key features, emerging technologies, and critical business criteria. Tines also earned Outperformer status based on our high rate of delivery in the last year, high release cadence, and strong roadmap for the upcoming year.

Thick Client Single Sign-On (SSO)

Are you tired of remembering passwords for all your thick client apps, or are you leaving your passwords at vulnerable places and entering them manually every time? Try miniOrange Thick Client Single Sign-on for seamless and secure access. Log in once to miniOrange dashboard and install our desktop software to access all your standalone thick client applications running, boosting your productivity and security.

How to Secure Your Network Infrastructure

With governments across the globe gearing up for major elections, experts have been predicting an increase in distributed denial of service (DDoS) attacks from nation-states and, so far, those predictions have paid off. According to Forbes, a recently thwarted DDoS attack found hackers sending traffic at 3.8 terabytes per second to a target server, peaking at 2.14 billion packets per second, making it the largest DDoS attack ever recorded.