Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

What are Netacea Threat Intel Feeds?

Learn more about Netacea Threat Intel Feeds, including how our customers use them to harden existing defenses, from Netacea CTO & co-founder Andy Still. This video explains how Netacea ensures the accuracy of its threat intelligence, the methods of data distribution, and the practical uses of Threat Intel Feeds in blocking malicious traffic and aiding in decision-making processes.

Public Sector Breach Alert: Q3 2024

The public sector has faced a surge of cyber attacks in recent months, targeting state agencies, schools and local governments, severely affecting operations. Several recently released cyber industry reports show a steady or growing number of ransomware attacks so far in 2024. The examples below are just some of the cyber attacks against public sector organizations this past summer.

How Security Debt Compounds Vulnerability Risk

Organizations often find themselves caught in a perpetual cycle of identifying, prioritizing, and mitigating vulnerabilities that pose the most risk. Amid this ongoing battle, a significant challenge is often overlooked: security debt. Much like technical debt, security debt refers to the accumulation of unresolved vulnerabilities within an organization’s systems and software.

The Relation Between Breaches and Stock Price Drops

When discussing the consequences of a data breach for organizations, we usually consider three types of damage: financial, legal, and, somewhat more tenuously, reputational. But what about stock prices? One would assume that stock price—an indicator of a business’s overall health and investor confidence—would plummet after a breach, but is this really the case?

Deciphering the Loss Exceedance Curve in Cyber Risk Quantification

On-demand cyber risk quantification (CRQ) models have the power to assess an organization’s unique risk profile and, subsequently, generate data-driven insights that facilitate informed risk management decisions. The basis of these insights is grounded on a probabilistic approach to event forecasting, which involves simulating thousands of potential cyber scenarios a business may experience over a given period, typically the upcoming year.

Zenity Researchers Discover Over-Permissions in Salesforce Copilot Topics

The Zenity Labs team has discovered that non-administrator users can modify existing flows that were connected to Einstein by an administrator, influencing Einstein without having the necessary permissions to edit it directly. In doing so, bad actors can easily insert malicious actions into flows that are triggered by business users throughout the enterprise, including phishing attacks, data exfiltration, and more.

Accelerating Torq's Vision: Announcing Our Series C Funding Round

I’m excited to share some significant news that marks a pivotal milestone in Torq’s journey. We’ve successfully closed our Series C funding round, securing a $70M investment to propel our mission of revolutionizing SecOps through the Generative AI-based Torq Hyperautomation Platform and cutting-edge Torq HyperSOC solution.