Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Enhancing Cybersecurity for Law Firms: Best Practices for Compliance and Personal Data Protection

Law firms manage a vast amount of sensitive information, from merger deals and criminal evidence to intellectual property and personal data, making them prime targets for hackers and malicious insiders. Security breaches can lead to reputational losses, remediation costs, and penalties. That’s why strict IT requirements regulate cybersecurity for law firms.

Trustwave MDR Named SC Media Awards Finalist for Best Managed Security Service

SC Media and SC Media Europe have each named Trustwave's Managed Detection and Response (MDR) solution as a finalist for the publication's Best Managed Security Service awards. The 2025 SC Awards were judged across 33 specialty categories by a distinguished panel of cybersecurity professionals, industry leaders, and CyberRisk Alliance CISO community members.

The State of Data Security: A Distributed Crisis

Welcome to the Data Security Decoded podcast by Rubrik Zero Labs. In this episode, our host Caleb Tolin speaks with Joe Hladik, a veteran security expert with two decades of experience, to explore the evolving landscape of cybersecurity, incident response, and the critical challenges of data security in today's distributed environments.

Recap: KubeCon + CloudNativeCon Europe 2025

When I got the assignment to attend KubeCon 1st of April I thought it was an April prank, but as the date got closer I realized—this is for real and I’ll be on the ground in London at the tenth anniversary of cloud native computing. I’ve seen a lot of tech events during my years in the industry while trying not to get replaced by AI and I have to say this one stands out! Image source: CNCF YouTube Channel Here is my recap of KubeCon + CloudNativeCon Europe 2025.

Who Must Comply with DORA? Complete Guide for Businesses

The Digital Operational Resilience Act (DORA) is a critical regulatory framework introduced by the European Union to enhance the digital resilience of the financial sector. It mandates a uniform set of standards for ICT risk management frameworks, digital resilience capabilities, and third-party service oversight. Enforceable by European supervisory authorities, DORA ensures that all covered entities can respond to and recover from major ICT-related incidents, including cyber attacks.

Security Bulletin: ClickFix and the New Era of Social Engineering

ClickFix is an emerging social engineering technique that has gained traction among both cybercriminals and APT groups due to its effectiveness and low barrier to execution. First observed around October 19, 2023, disguised as Cloudflare anti-bot protection, ClickFix deceives users into taking action to “fix” a non-existent issue, often through fake reCAPTCHA pages, spoofed software updates, or fraudulent security prompts.

Automated Baseline Enforcement with Falcon for IT

CrowdStrike Falcon for IT automates baseline enforcement and remediation to eliminate the security gaps adversaries exploit. As devices drift from their original secure state—through unauthorized software, missing updates, or policy deviations—Falcon for IT uses real-time telemetry and Dynamic Targeting to surface misconfigurations and highlight non-compliant endpoints. With tools like Charlotte AI, osquery, and native scripting, teams gain instant visibility into deviations, apply targeted remediation at scale, and enforce standards without disrupting end users.

How Teleport Simplifies Just-in-Time Access

Just-in-time (JIT) access isn’t easy. This Reddit thread of cybersecurity pros surfaces many of the most common JIT headaches — and you may be encountering those same challenges yourself. As noted in the thread, no users should be “swimming in access”, especially as standing privileges and over-permissioned accounts continue to be a major source of breaches. The truth is, many JIT models struggle to keep up with today’s fast-moving, cloud-native environments.