Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Combatting Cloud Threats: The Accelerated Attack Speed of 2023 (LIVE)

Cloud threats are evolving and attackers are moving faster than ever! Join Sysdig’s Michael Clark (Director, Threat Research) and Anna Belak (Director, Office of Cybersecurity Strategy) LIVE on Linkedin, Twitter, and Youtube, as they discuss key findings from Sysdig’s �������� ������������ ���������� ������������ ������������. From cloud automation as a weapon to software supply chain vulnerabilities — the annual report authored by Sysdig’s Threat Research Team exposes shocking statistics on the evolving tactics of attackers lurking within the clouds.

Building Resilience Against Living Off the Land Attacks

Living Off the Land (LOTL) cyber attacks represent a growing and increasingly sophisticated threat within the cybersecurity landscape. The significance of LOTL attacks extends beyond mere technicalities; they pose substantial risks to global security, influencing everything from corporate stability to national defense mechanisms.

Is CREST Certification Worth In 2026? A Complete Guide

CREST certification sits at a fascinating crossroads in 2025 – respected enough to open doors, expensive enough to make your bank account wince, and practical enough to actually prove you know your security testing inside out. After spending 15 years working as a cybersecurity professional, I’m going to break down exactly what you need to know about this certification’s worth today.

Carlsberg Selects Cato, the "Apple of Networking," for Global SASE Deployment

Today, we announced that Carlsberg, the world-famous brewer, has selected Cato SASE Cloud for its global deployment. It’s a massive SASE deployment spanning 200+ locations and 25,000 remote users worldwide, replacing a combination of MPLS services, VPN services, SD-WAN devices, remote access VPNs, and security appliances.

Cybersecurity Sessions S02E04: National Risk Register, Encrypted Messaging, Residential Proxies

This month we begin by examining the 2023 National Risk Register, a public version of the National Security Risk Assessment, which assesses the most serious risks to lives, health, society, critical infrastructure, economy and sovereignty. Cyber-attacks on infrastructure are listed as moderate impact – Our panel discusses how businesses can use the information within the report to prepare for attacks and keep our critical infrastructure as secure as possible.

Why is API security the next big thing in Cybersecurity?

APIs, formally known as application programming interfaces, occupy a significant position in modern software development. They revolutionized how web applications work by facilitating applications, containers, and microservices to exchange data and information smoothly. Developers can link APIs with multiple software or other internal systems that help businesses to interact with their clients and make informed decisions.

Wi-Fi 6 or 5G? You no longer need to choose between the two to be protected

Fast, low-latency, high-capacity networks are needed in today's environment. However, these advanced networks face a significant challenge: combining speed, reliability, and flexibility with security. Until recently, much debate has been about which technology was better for protection purposes. There seemed to be a constant battle between users who saw more advantages in Wi-Fi 6 and users who preferred 5G networks.

2023 Business Email Compromise Statistics

In cybersecurity, knowledge is everything. From APT intelligence to zero-day vulnerabilities, relevant and timely information can be the difference between a thwarted attack and a total disaster. With Business Email Compromise (BEC) attacks at their zenith, there has never been a better time for a comprehensive BEC report. As such, Fortra has released its 2023 BEC Trends, Targets, and Changes in Techniques Report.

Submit Your Incident Feedback Directly In The GitGuardian Dashboard

GitGuardian is making it easier and safer than ever to gather feedback about secret leakage incidents. We have added a feedback form directly to the GitGuardian dashboard incident detail view, allowing your team to provide more info about the incident, including confirming if it's an actual secret, if it gives access to any sensitive info, if it has been revoked, as well as any other relevant details.

Tackling your Cybersecurity weak point: Your Supply Chain

The suppliers are the weak point in the security organization, 62% of attacks were through suppliers..... Existing tactics such as periodic pen testing, questionaires etc. don't cut it! Find out who your suppliers are, how healthy their protection is, how targeted they are AND be notified when an issue happens.