Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Role of Data Transfer Monitoring with DLP in Tracking Internal & External Data Movement

Data Loss Prevention (DLP) tools are crucial for protecting sensitive information as it moves within and outside an organization. They help prevent data leaks and unauthorized access by allowing organizations to monitor, control, and respond to potential data transfer risks. In this article, let’s learn more about how DLP tools play a vital role in secure data transfers.

Yet Another NodeJS Backdoor (YaNB): A Modern Challenge

During an Advanced Continual Threat Hunt (ACTH) investigation conducted in early March 2025, Trustwave SpiderLabs identified a notable resurgence in malicious campaigns exploiting deceptive CAPTCHA verifications. These campaigns trick users into executing NodeJS-based backdoors, subsequently deploying sophisticated NodeJS Remote Access Trojans (RATs) similar to traditional PE structured legacy RATs.

AI and Compliance with Adam Winston

This week on the podcast, we bring in Adam Winston, former CSO of ActZero and current Field CTO for Managed Services at WatchGuard to discuss automating the SOC with AI. We cover the history of AI in SecOps, the good and bad applications of AI and Machine Learning, what the future looks like, and how compliance might impact our ability to get there.

Cyberhaven Spring 2025 Product Launch

AI Took Off. We’re Launching the Controls. Discover how Cyberhaven is rewriting the rules of AI data security. Our newest innovation is too big to call a feature — it’s a new frontier. AI changed everything... fast. Productivity soared, but so did risk. Employees embraced AI, and data raced across tools without oversight. The question isn’t if your organization is using AI — it’s how much risk it’s exposing in the process.

How to Set Up Astra Traffic Collector in a Linux VM | Complete Installation & Troubleshooting Guide

This tutorial provides a complete guide to deploying Astra Traffic Collector inside a Linux-based VM across cloud platforms like AWS, GCP, Azure, or DigitalOcean. It includes all necessary installation steps and configuration best practices for traffic monitoring in VM environments. In this video, we cover: This guide is designed for DevOps, security engineers, or platform teams looking to integrate deep traffic visibility into their environments with minimal overhead.

How to Set Up AWS Traffic Mirroring for Astra API Monitoring | Full Step-by-Step Guide

This tutorial provides a complete walkthrough for setting up AWS VPC Traffic Mirroring to enable packet-level monitoring with Astra’s API Security platform. You'll learn how to configure a scalable and production-ready environment using Network Load Balancers, Nitro-based EC2 instances, and properly filtered traffic sessions. The guide includes: It also covers key assumptions, unsupported configurations (like classic/Xen instances), and best practices for a secure and efficient deployment.

How To Secure Data When Working With Freelancers and Subcontractors

Working with freelancers and subcontractors is essential for business growth, but it also introduces security risks. In this short video, learn the top security threats businesses face when working with freelancers and several tips you can use to secure your organization’s data.

How to Easily Backup and Restore Red Hat OpenShift Virtualization VMs (Updated Tutorial)

In this tutorial, Martin Phan, Field CTO at CloudCasa, demonstrates how to easily back up and restore virtual machines (VMs) in Red Hat OpenShift Virtualization. You'll learn how to register your OpenShift cluster with CloudCasa, protect containerized VMs, and perform full VM restores — including the ability to restore to a different or existing namespace with options to clear the MAC address and generate a new firmware UUID. Martin walks you through the complete process: installing the agent, defining backup jobs, monitoring backup activities, and restoring VMs step-by-step.