Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cyberhaven Winter 2025 Product Launch

Join us for the exclusive unveiling of Cyberhaven's next evolution, hosted by our leadership & product teams. We're (once again) changing the way companies visualize, detect, and protect their data. Be the first to see what's next. Imagine if You Could: Discover how Cyberhaven is setting the gold standard for the future of data security in the age of AI.

Cyberhaven Spring 2025 Product Launch

AI Took Off. We’re Launching the Controls. Discover how Cyberhaven is rewriting the rules of AI data security. Our newest innovation is too big to call a feature — it’s a new frontier. AI changed everything... fast. Productivity soared, but so did risk. Employees embraced AI, and data raced across tools without oversight. The question isn’t if your organization is using AI — it’s how much risk it’s exposing in the process.

What is FIPS 140-3?

Encryption has become a vital data protection tool used by global governments, defense and enterprises. However, not all solutions use the same cipher techniques. Several encryption algorithms can be used to secure data with varying levels of security. To establish acceptable standards for encryption technologies utilized by the U.S. Government, the National Institute of Standards and Technology (NIST) published the Federal Information Processing Standards (FIPS) FIPS-140.

What are CIS Benchmarks and how to use them?

A list of 18 procedures (reduced from 20), or “controls,” recommended by the Center for Internet Security (CIS), must be followed to build an IT infrastructure resistant to cyberattacks. The CIS 4th Control advises to establish and maintain a secure configuration process for enterprise assets (end-user devices, including portable and mobile; non-computing/IoT devices; and servers) and software (operating systems and applications) (4.1).

Cloud XDR for Incident Response: Reducing MTTR with Automated Remediation

Security teams now handle up to two million alerts daily, and the time it takes to resolve threats—MTTR—can directly affect business resilience. Cloud-based Extended Detection and Response (XDR) systems address these challenges by streamlining the entire process—from detection to automated remediation. By harnessing cloud-native architectures and response automation, organizations can detect threats faster and cut resolution times significantly.

The Top Phishing Lures Targeting Manufacturers Revealed by Trustwave SpiderLabs

Threat actors who rely on email phishing scams as their primary method of gaining initial entry use a wide variety of social engineering lures to trick their victims. Trustwave SpiderLabs recently released the report Manufacturing Sector Deep Dive: Methods of Targeting and Breaching, which specifically calls out many noteworthy campaigns and methodologies used by the top-tier threat groups.