Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why we invested in Device Authority

Ten Eleven exists to provide high-value, cyber-focused counsel, capital, and connections to brilliant security entrepreneurs. We understand the unique problems security entrepreneurs face because we’ve been there and seen what makes the difference. One of the things that experienced cyber practitioners understand is how important it is to have technologies that work in the messy existing real world, not just green field new architectures.

Chinese Hackers Spy on Dutch Ministry of Defense: A Story of Alarming Cyber Espionage

In a revelation that adds yet another chapter to the ongoing saga of international cybersecurity threats, the Dutch Ministry of Defense recently shed light on a significant security breach. Reports that state-sponsored Chinese hackers have infiltrated the internal computer network the ministry uses were confirmed.

KuppingerCole Names Sysdig a Product and Innovation Leader for CNAPP

The cloud security market is still maturing and growing at a rapid pace. New security jargon, solutions, vendors, and acronyms are constantly appearing, making it difficult to have a clear sense of what approach to cloud security is best for your own organization. Cloud-native application platforms (CNAPPs) are one of the most recent categories in this space.

Can National Awareness Days Help Shift Attitudes To Internet Safety?

February brings a flurry of cybersecurity awareness days. On February 1st, Change Your Password Day reminded us that using “Rover123!” for yet another online account is not an appropriate defence between ourselves and cyber criminals, while yesterday—Safer Internet Day—encouraged us to take positive steps toward protecting ourselves online. But how long do these positive reminders last?

Product Quality at Rubrik - Part 2

In our previous blog, we discussed the importance of product quality, different types of testing we rely on at Rubrik, and how automated testing plays a pivotal role in ensuring quality of our products. Relying heavily on Unit, Component and Integration testing is important. But there will be code paths which we may not be able to cover using these types of tests. In the picture below, we can see a high-level view of our solution.

Cost-Effective Disaster Recovery for Wasabi and Veeam

In the IT industry, downtime is typically estimated at approximately $5,600 per minute, posing a significant threat to revenue, customer trust, and compliance. For SMBs, safeguarding data and ensuring business continuity are paramount for survival and competitiveness. A robust disaster recovery (DR) solution not only protects against threats like cyberattacks and hardware failures but also minimizes downtime, demonstrating reliability to customers and partners.

Creating DataTrails for Supply Chain Artifacts

In a world where software is produced, distributed, and re-distributed, how do you ensure the software you consume is authentic and safe for your environment? How do you know the software you deployed yesterday is safe today? Most software exploits are discovered after the software has been deployed, which raises the question: It’s not just about getting software updates, as the majority of exploits are distributed as updates. Staying updated isn’t the most secure.

Arctic Wolf's 24x7 Monitoring Secures Parramatta's Fans and Members Valuable Data

As two of the most recognizable brands in Western Sydney, Parramatta Eels and Parramatta Leagues Club know that cyber threats are always lurking. Thanks to a comprehensive partnership with Arctic Wolf, the club is able to to focus on a full digital transformation to become a club of the future, providing fans and members with customized experiences while expanding the breadth and depth of their cybersecurity.