Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Hyperdrive for Your Data

Whether it needed to outrun Imperial fighters or make the Kessel Run in less than 12 parsecs, the Millennium Falcon simply couldn’t work its magic without a functioning hyperdrive. Similarly, today’s business enterprises need a way to move vast amounts of data quickly, securely, and without interruption—but relying on the public internet simply isn’t cutting it. Data is one of the most valuable resources a business can have.

Guide: What is the CMMC-AB (Accreditation Body)?

Every year that goes by shows an improvement in technology, often by leaps and bounds over previous technology. What used to be the realm of far-off science fiction so unbelievably exotic that it defined genres is now a commonplace reality. With new technology comes new threats. We’ve seen a dramatic increase in digital threats, from the SolarWinds supply line attack, to the compromised Outlook services, to the currently-ongoing Salt Typhoon attack on telecom companies.

#196 - Security challenges in the Arctic with Deepak Dutt, Founder of Zighra

On this episode of The Cybersecurity Defenders Podcast, we talk about security issues in the Arctic with Deepak Dutt, Founder of Zighra. Deepak is a technology leader and entrepreneur on a mission to secure the future against AI-powered threats and to inspire founders to transform their ideas from zero to meaningful impact. Deepak’s career began in the software space, inspired by his father’s passion for technology. In his late teens, he founded his first company in the eLearning space, which he successfully led to an acquisition, relocating to Ottawa at the age of 21.

LimaCharlie Playbooks demo

LimaCharlie Playbooks expand the use of Python in the SecOps Cloud Platform (SCP), letting users reduce the learning curve for leveraging advanced capabilities in our platform. While the current format of our detection and response rules remain highly effective, our playbooks make much of the same functionality available to Python scripts. Playbooks also give users extreme control and granular functionality over certain operations that LCQL does not.

AI Governance in AppSec: The More Things Change, The More They Stay the Same

Every hype cycle brings fresh security concerns, and AI is no exception. AI governance might sound like uncharted territory, but it’s really just another evolution of the same security principles AppSec teams have been applying for years. The fundamentals—secure coding, risk management, compliance, and policy enforcement—haven’t changed.

The founder's guide to accelerating growth with compliance

For founders of early-stage startups, growth is the North Star. You’re focused on building a great product, winning customers, and scaling fast. Security compliance? It’s probably not on your radar—but it should be. ‍ The reality is, compliance isn’t just a nice to have or a box to check when a customer asks to see a SOC 2 report. It’s a revenue accelerator.

Why Organisations Still Fall Victim to Phishing and How to Avoid It

Phishing remains a significant threat to organisations, despite advancements in cybersecurity. The tactics used in phishing attacks have evolved significantly. Attackers now use advanced techniques like spear phishing, targeting specific individuals or roles within an organisation, and clone phishing, which duplicates legitimate messages but includes malicious links.

Bridging Innovation and Policy: Zenity's Strategic Discussions in Washington DC

I recently had the fantastic opportunity to represent Zenity in a round of strategic discussions with legislative and policy leaders in Washington DC as a part of the OpenPolicy Coalition. Zenity has recently partnered with OpenPolicy and joined the ecosystem in the effort to bridge the gap between bleeding edge innovation and traditional policy.

How metadata wrestled control of FINRA's colossal data archiving requirements

The financial industry is known for its rigorous and sometimes quirky data retention requirements that can challenge even the most seasoned security expert. For example, FINRA Rule 4511 requires members to "preserve for a period of at least six years those FINRA books and records for which there is no specified period under the FINRA rules or applicable Exchange Act rules." Keeping six years of records: That's no small feat. But it's certainly doable.

Quick FIX log management: How metadata simplifies financial protocol tracking (and how Corelight's platform can help)

Financial institutions, such as banks and trading houses, have a strong interest in recording key transaction activity within their networks. In the face of daunting data storage requirements, many are finding that Corelight’s network metadata—notably metadata produced by Zeek—is the key to a simplified tracking and storage process. Many of our customers used to rely on packet capture (PCAP).