Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Best Practices for Transitioning from Security to Privacy

As global privacy requirements evolve, many information security professionals are called upon to enhance or lead information privacy programs. While this transition may seem like a natural progression, I learned five important lessons when I moved from a focus on security and audit to the field of information privacy.

NIS 2 compliance checklist: The ultimate 7-step approach for your organization

With NIS 2 becoming part of national laws, compliance has become mandatory for organizations within its scope. ‍ Although NIS 2 has addressed some of its predecessor’s shortcomings by expanding its scope and setting clearer security and reporting requirements, it remains demanding for security and compliance teams. Its prescriptive guidance and requirements are still limited in certain areas, which can leave teams uncertain about the exact steps to take.

GitGuardian Launches NHI Governance to Secure Non-Human Identities and Their Secrets for Enterprises

Secrets sprawl is a growing cybersecurity challenge, especially with NHIs. GitGuardian's new NHI Governance product offers centralized inventory and lifecycle management to help enterprises regain control over their secrets and prevent costly breaches.

Closing the Gap: How to Build a Consistent Exposure and Vulnerability Management Workflow

Security teams are faced with an ongoing challenge when it comes to exposure and vulnerability management. It’s not the actual discovery of the vulnerability that poses the challenge, but what to do once you discover one. Without a structured process, IT and security teams struggle to address vulnerabilities efficiently, and are in a constantly reactive mode, and struggle to address vulnerabilities efficiently, increasing potential risks.

NetSupport RAT Malware: VM Evasion & Self-Deletion Tactics

Researchers at Foresiet have analyzed a Remote Access Trojan (RAT) known as NetSupport Manager. Originally developed as a legitimate remote access and IT support tool, NetSupport Manager has a history spanning over two decades. It provides features such as file transfer, remote desktop sharing, chat support, screen monitoring, and inventory tracking. However, in recent years, threat actors have increasingly weaponized this tool in malicious campaigns.

Can End-to-End Encryption Be Hacked?

We have become so reliant on communicating on the Internet that sometimes we need to take a minute to consider how our data is being protected and whether what we send on the Internet is truly safe. While end-to-end encryption has become integral to protecting our data online, you may be thinking, can end-to-end encryption be hacked?

How Corelight's anomaly detection enhances network security

Signature-based detections provide fast, effective defense against known attacks. But the threat landscape is rapidly changing: Attackers are utilizing novel, sophisticated techniques that can bypass traditional, signature-based detection methods and also weaponizing legitimate tools and processes to avoid established detection tools, including endpoint detection. In this dynamic environment, organizations must in turn deploy new detection techniques to keep pace.

Enhanced Cloudflare Access: private hostnames, IP apps, and reusable policies

Welcome to Cloudflare Security Week 2025! During this year's Security Week, we are boosting security with AI-driven insights, better threat detection, and stronger protections against emerging risks. Our aim is to empower customers with more intuitive and user-friendly solutions to protect their data and applications in an increasingly complex environment. In this episode, tune in for a conversation with Cloudflare's Kenny Johnson, Principal Product Manager.

Managing sensitive data exposure in AWS and GCP using Cloudflare

Welcome to Cloudflare Security Week 2025! During this year's Security Week, we are boosting security with AI-driven insights, better threat detection, and stronger protections against emerging risks. Our aim is to empower customers with more intuitive and user-friendly solutions to protect their data and applications in an increasingly complex environment. In this episode, tune in for a conversation with Cloudflare's Alex Dunbrack, Senior Product Manager, and Noelle Kagan, Senior Manager, Product Management.