Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Olympic Games Special: How to protect cybersecurity of sports organizations

Millions of spectators from around the world will flock to Paris this summer to attend the 2024 Olympic Games. The UEFA European Football Championship and the America's Cup are also taking place this summer, giving us weeks of massive sporting events on both sides of the Atlantic.

Threat Actor Distributes Python-Based Information Stealer Using a Fake Falcon Sensor Update Lure

On July 23, 2024, CrowdStrike Intelligence identified a malicious ZIP file containing a Python-based information stealer now tracked as Connecio. A threat actor distributed this file days after the July 19, 2024, single content update for CrowdStrike’s Falcon sensor — which impacted Windows operating systems — was identified and a fix was deployed. The ZIP file uses the filename CrowdStrike Falcon.zip in an attempt to masquerade as a Falcon update.

Password Hygiene Tips and Best Practices

Password hygiene tips to follow include using unique passwords, enabling Multi-Factor Authentication (MFA) and keeping your passwords safe in a password manager. Password hygiene encapsulates the best practices for protecting your passwords and online accounts. When you practice good password hygiene, your strong passwords will prevent you from becoming a victim of cyber attacks, virus and malware infections, password breaches and more.

Network Digital Twin Technology identified as Transformational in Hype Cycle for Enterprise Networking, 2024

It seems as if there is a new networking technology announced every day. When faced with a deluge of information and vendors seeking your attention, it’s easy to get overwhelmed. We feel the Gartner Hype Cycle reports seek to tame the confusion by objectively reviewing new technologies and applications and offering IT leaders a view of how new additions to the market will evolve over time.

Ransomware: A Major Threat to Data Security with Renata Spinks of CyberSec International

Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. Each episode features senior cybersecurity leaders and other luminaries with unique perspectives about the current state of data security. We explore rising trends and themes across cybersecurity and unpack what that means for organizations looking to secure their data and achieve cyber resilience.

Creating an Incident Response Process

In today’s cyber threat landscape, almost everyone is one bad day away from a security incident. While not every incident becomes a data breach, security teams need to be prepared for anything. Just like that one friend who has a spreadsheet to help them organize the minute tasks associated with a project, security teams need to have a prepared list of steps to take during an incident.

CISOs Stop Struggling! Trustwave Security Colony - Your All-in-One Cybersecurity Arsenal

Few repositories of cybersecurity knowledge are as broad, deep, and widely respected as Trustwave Security Colony. The industry analyst firm IDC has praised Security Colony, which sees clients and others interested in learning more about their cybersecurity posture download thousands of resources every month, much of which is available for free. IDC deemed this information so important that, in a recent report, it named Security Colony a "differentiator" from others in the field.

Random but Memorable - Episode 13.1: Doughnut Panic Sting Operation with Joseph Cox

Strap yourselves in for a wild ride, as we kick off a new season with the incredible true story of the largest FBI sting operation ever. Cybersecurity author and journalist, Joseph Cox, unpacks his best-selling book, Dark Wire. Learn how the FBI built its own app to wiretap the world and turn the tide on the criminal underground, with privacy implications for everyone. Trust us, you won't want to miss this one.