Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What We Can Learn from the 'Prompt-bomb' Uber Hack

It was the worst-case scenario for Uber, the popular ride-sharing app, when the company suffered a major data breach in early September. While the extent of the damage, and the data potentially stolen, is still being uncovered, the attack — and the methods used to execute it — can be examined and used to teach other organizations what (and what not) to do.

Is the EU Cyber Resilience Act Really Possible Without Zero Trust Automation?

In May 2021 President Joe Biden issued out Executive Order 14028. The order focused on “Improving the Nation’s Cybersecurity” to support and protect the nation’s critical infrastructure and Federal Government networks. This directly relates to the trustworthiness and transparency in ALL digital infrastructure – IT, OT, IoT, IIoT.

CrowdStrike Unlocks XDR for All EDR Customers and Expands Third-Party Integrations Across All Key Security Domains

CrowdStrike further integrating third-party telemetry from CrowdXDR Alliance partners, which now include Cisco, ForgeRock and Fortinet as new members, and third-party vendors, which now include Microsoft and Palo Alto Networks.

Risk counts for Cyber and here is why

Risk is one of those standard terms within cybersecurity that, when asked to define, many struggle to explain what risk is and how it applies to cybersecurity. To start, we need to understand risk as it applies to security. Risk, like mathematics, is an artificial construct that humans use to understand and describe their environment.