Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cloud identity insights - Detect at the edge in real time

Cloud attacks strike fast. Prevention used to be enough, but not anymore. And legacy EDR tools fall short because they lack visibility into cloud identities and behavior. Defenders need the ability to detect at the edge - in real time - and correlate early stage identity behavior to see what's happening fast.

The Willy Wonka World of Application Security Defenses

One doesn’t have to be a magician to understand how to track the hundreds, if not thousands, of applications that are running on your network. To lighten the load and eliminate the need for having supernatural abilities, let’s go over some simple tasks a security defender can take to track, detect, and even block application threats.

Navigating the AI-powered development era in financial services

Australian and New Zealand financial service institutions (FSIs) are facing pressure to innovate quickly while maintaining robust security and regulatory compliance. Many, like ANZ Bank and Commonwealth Bank, are exploring Generative AI to accelerate software development, but is it a silver bullet?

Trustwave Data Reveals HTML Attachments, QR Codes, and BEC as Top Email Attack Vectors

The Trustwave SpiderLabs team regularly collects a trove of data while protecting clients from email-based attacks. HTML attachments, malicious QR codes, and business email compromise (BEC) are the favored attack methods. A recent snapshot of data from June 2024 from Trustwave MailMarshal shows that email-based threat actors still favor HTML attachments to deliver a variety of malware types.

A Blueprint for Hyperautomating Your Next-Gen Secure Software Development Lifecycle

Aner Izraeli is the Chief Information Security Officer (CISO) at Torq. He leads Torq’s cybersecurity strategy with a focus on innovation and resilience. Aner’s career spans over two decades in the cybersecurity field, where he has consistently demonstrated expertise in SIEM/SOC, incident response, and network security.

Strengthening Australia's Government Data and Digital Services with Splunk Digital Resilience

As the Splunk Industry Advisor to the Australian public sector, I work closely with government organisations and their leaders to understand their goals, objectives and the challenges they face in achieving digital resilience. This blog shares perspectives on how Splunk works with the Australian government to provide a unique approach to solve some of the public sector's toughest challenges.

The crypto predictions most likely to change the ecosystem in 2024

Cryptocurrencies have been going through some difficult times over the past couple of years, but it seems that 2024 is the year when that finally changes. 2022 was challenging through and through, with the prices dropping considerably and investors unsure of how they should proceed going forward. Although 2023 started off on a much more promising note, it ended up being a rather lackluster year, with the performance levels far below what most investors were expecting.

Product Design: A Comprehensive Guide to Creating User-Centric, Market-Ready Products

Product design is a critical component in the creation of successful products that resonate with users and thrive in the marketplace. It is a multidisciplinary field that blends creativity, technology, and business strategy to develop products that not only meet user needs but also align with business goals. In this comprehensive guide, we will explore the intricacies of product design, its processes, key principles, and the tools and techniques used by designers to create products that stand out.