Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Change Your Password Day: Why It's Time to Rethink Password Security

As Change Your Password Day rolls around on 1st February, it’s a great opportunity to highlight the importance of secure password practices. While traditional advice has often encouraged frequent password changes, this approach has been reconsidered by cybersecurity experts, including the National Institute of Standards and Technology (NIST). Modern best practices now recommend focusing on creating strong, memorable passwords and using multi-factor authentication (MFA) to enhance security.

Cloud Workloads - Containers - Tanium Tech Talks #118

Today we explore Tanium's new support for containers. It goes way beyond basic visibility. See these use cases across Tanium's popular modules: Interact - query containers across registries just like other endpoints Asset - four new reports for container inventory, including SBOM, rogue, and privileged containers Comply - scan for container image vulnerabilities, including SBOM Enforce - implement security guardrails with new container policies Reporting - a bonus Cloud Workloads dashboard.

Building AI and LLM Inference in Your Environment? Be Aware of These Five Challenges

Building AI and LLM inference and integrating it in your environment are major initiatives, and for many organizations, the most significant undertaking since cloud migration. As such, it’s crucial to begin the journey with a full understanding of the decisions to be made, the challenges to overcome, and the pitfalls to be avoided along the way.

How Trustwave's Fusion Platform Analyzes Ransomware Tactics in the Energy Sector: A Comprehensive Overview

Trustwave SpiderLabs has multiple methods and tools available to keep its teams apprised of the tactics, techniques, and procedures (TTPs) threat groups utilize during an attack, but perhaps the most useful is our cloud-native Fusion dashboard.

What is ACME Protocol and How does it Work: A Complete Guide

You might have visited a website and seen a warning that says: “Your connection is not private.” This often happens when a website’s security certificate has expired. It is a small oversight that can harm a website’s reputation and make visitors think twice before proceeding. For website owners, managing digital certificates manually can be a real challenge. To simplify this process, the ACME Protocol was developed.