Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Achieving Zero Trust Maturity with Cato SSE 360

Trust is a serious issue facing enterprise architectures today. Legacy architectures are designed on implicit trust, which makes them vulnerable to modern-day attacks. A Zero Trust approach to security can remedy this risk, but transitioning isn’t always easy or inexpensive. CISA, the US government’s Cybersecurity and Infrastructure Security Agency, suggests a five-pillar model to help guide organizations to zero trust maturity.

The Dark Side of Cybersecurity: Battling Cyber Evil w/ Paul Dwyer

Paul Dwyer, a prominent figure in the world of cybersecurity, delves into the complex and multifaceted realm of cyber threats. Join us as we explore the blurred lines between cyber warfare, cyber terrorism, and cybercrime, all converging into a malevolent force known as cyber evil. Discover the pivotal role of cybersecurity professionals in combating this darkness, relentlessly protecting our digital society from the abyss.

CrowdStrike Named a Leader with "Exceptional" MDR Service: 2023 Forrester Wave for MDR

Forrester has named CrowdStrike a Leader in The Forrester Wave™: Managed Detection and Response (MDR), Q2 2023 which recognizes how CrowdStrike’s “exceptional” Falcon Complete MDR service “blends products, platforms, and services seamlessly for customers.” Forrester evaluated 13 top MDR providers based on the strengths of their current offering, strategy and market presence.

Don't Choose a Cloud Storage Service Without Asking These 10 Critical Cybersecurity Questions

As the demand for cloud storage continues to rise, individuals and businesses alike are faced with the critical decision of choosing a reliable and secure cloud storage provider. While the convenience and accessibility offered by cloud storage are undeniable, it is essential to prioritize cybersecurity and data protection when entrusting sensitive information to a third-party provider.

Six Key Security Risks of Generative AI

Generative Artificial Intelligence (AI) has revolutionized various fields, from creative arts to content generation. However, as this technology becomes more prevalent, it raises important considerations regarding data privacy and confidentiality. In this blog post, we will delve into the implications of Generative AI on data privacy and explore the role of Data Leak Prevention (DLP) solutions in mitigating potential risks.

MeriTalk Honors TGS President Bill Rucker with Prestigious 2023 Cyber Defenders Award

For the second year in a row, Trustwave Government Solutions President Bill Rucker was honored by Meritalk with its Cyber Defenders Award. Rucker earned this award, from the federal government IT news and events provider, for driving innovation, advancing the nation’s cybersecurity, and making significant contributions across cyber programs in Federal IT.

Hype vs. Reality: Are Generative AI and Large Language Models the Next Cyberthreat?

Generative AI and large language models (LLMs) have the potential to be used as tools for cybersecurity attacks, but they are not necessarily a new cybersecurity threat in themselves. Let’s have a look at the hype vs. the reality. The use of generative AI and LLMs in cybersecurity attacks is not new. Malicious actors have long used technology to create convincing scams and attacks.

Introducing Passage by 1Password - the simple way to add passkey support to your app or website

Toward the end of last year, Passage joined 1Password to bring passwordless authentication to everyone. Now, we’re ready to introduce you to Passage by 1Password: the fastest and most secure way for developers and businesses to add passkey support to their products.

Leveraging Security Asset Inventories

Asset inventories enable you to know what you have to secure, and to monitor it for deviations. The pace of iteration in the world of software engineering makes those platforms inevitable. In this episode we welcome Sacha Faust, director of security engineering at Grammarly, who built Cartography, one of the first open source asset inventory. Sacha describes what led them to building this (funnily: an offensive use case!), how inventories enable spreading ownership to software teams, the solution that exist off the shelf today, …