Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Hey, You. Get Off of My Cloud

The Rolling Stones wanted to protect their space; we, as security practitioners, need to protect ours. Data 'castles' in the cloud are out there, and they're constantly under siege. By drawing inspiration from a band that embodied personal freedom, we can draw some – okay, very stretched - parallels to modern cloud security. Nonetheless, they work. And we all knew this blog was coming. And if you read the blog backward you can hear the name of the latest malware family... Maybe.

Xalient achieves continued compliance with ISO 20000:2018 and expands scope to the Benelux region.

Xalient is proud to announce that it has successfully maintained its ISO 20000:2018 certification for Service Management in a recent audit, marking another milestone in its journey of operational excellence. This achievement, led by Craig Ingham, Xalient’s Group Information Security & Compliance Director, demonstrates Xalient’s dedication to providing high-quality IT services while successfully managing end-to-end service delivery.

K-12 Cybersecurity: The Growing Threat Schools Face

Classrooms have never been more connected. Many students are issued laptops or tablets instead of textbooks, while teachers and administrators rely on dozens of apps and connected devices like Smartboards to provide instruction, track grades, manage bus schedules, create budgets, and orchestrate countless other school-related activities.

Revolutionizing Security: The Digital Transformation Journey

In today's rapidly evolving world, the shift towards digital solutions in security is not just a trend but a necessity. Join us as we dive deep into the heart of digital transformation in security with Neerja Bajaj, a visionary in the field. 💼🛡️ Discover how cutting-edge technologies are reshaping the way we manage and secure spaces, offering unprecedented levels of efficiency and safety. From smart access control to integrated security ecosystems, learn how these innovations are paving the way for a safer, smarter future. 🚀📈

The 2024 Cybersecurity Excellence Awards Recognizes archTIS Products as Winners in Data-centric Security and National Cyber Defense

archTIS is excited to share that the company has been honored with two significant awards in the 2024 Cybersecurity Excellence Awards. Our products, Kojensi and NC Protect, have been recognized in the National Cyber Defense and Data-centric Security categories. We are proud to be acknowledged by the Cybersecurity Excellence Award judges for our commitment to excellence, innovation, and leadership in cybersecurity.

KnowBe4 Earns Multiple 2024 Best Of Awards From TrustRadius

KnowBe4 is proud to be recognized by TrustRadius for our Security Awareness Training and PhishER platforms. KnowBe4's Security Awareness Training won in the Security Awareness Training category and PhishER won in Incident Response, Security Orchestration, Automation and Response and the Phishing Detection and Response categories.

9 in 10 Organizations Paid At least One Ransom Last Year

New analysis of cyber attacks shows ransomware attacks are running far more rampant than previously thought, with half of organizations blaming poor cyber hygiene. After last year’s shocking stat that 70% of organizations pay the ransom, it’s really surprising to see that an even greater percentage (91%) have paid a ransom at least once in the last 12 months – this according to Extrahop’s 2024 Global Cyber Confidence Index.

The Human Element of Email Security: Understanding Behavioral Threats and Social Engineering

Behavioral threats and social engineering attacks target the human psyche rather than exploiting technical vulnerabilities. They rely on psychological manipulation, deception, and exploiting human trust to trick individuals into divulging sensitive information, clicking on malicious links, or taking actions that compromise security. Understanding these tactics and the human behaviors they exploit is key to effectively mitigating email security risks.

Elastic integrates Anthropic's Claude 3 models to enhance AI-driven security analytics

For security analysts navigating an increasingly complex threat landscape, the ability to quickly identify and respond to attacks is critical. Security information and event management (SIEM) tools have been integral to helping security teams quickly respond to attacks. Now, in the era of generative AI, Elastic is changing the game by delivering AI-driven security analytics to replace SIEM and modernize the SOC.