Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

Graylog API Security Content Pack: Changing the Game!

APIs form the backbone of modern digital systems, enabling seamless data exchange and integration. However, their critical role also makes them attractive targets for cyber threats. Traditional security measures often fail to address API-specific challenges effectively. Graylog API Security Content Pack emerges as a game-changer, reimagining API defense through innovative threat detection and response approaches.

Phishing Attacks Are Increasingly Targeting Social Media and Smartphone Users

Threat actors are increasingly tailoring their attacks to target social media apps and smartphone users, according to a new report from the Anti-Phishing Working Group (APWG). As email security technologies improve, scammers are turning to social media apps, text messages, and voice calls to conduct social engineering attacks.

What Is SaaS Sprawl? How to Manage It

Think of a cluttered desk, but on a digital scale. Businesses rely on hundreds of cloud-based, third-party Software-as-a-Service (SaaS) applications. Over a quarter (28%) of SME employees require 11 or more tools to manage the worker lifecycle. From the end user perspective, this isn’t a bad thing at all. Why not? SaaS applications are easy to activate, often coming with free editions or low-cost versions that accomplish a specialized task.

The Invisible Shield: Exploring the Silent Guardians of IoT Security

Effectively acting as an invisible shield, the inner workings of IoT security are often taken for granted. However, we can focus and shine a light on the protocols and practices that provide the foundation of IoT security to help others see how these efficiently operate behind the scenes to protect complex networks of interconnected devices.

PII vs PHI vs PCI: What is The Difference

In this age of digital supremacy, keeping our data safe and respecting privacy are super important. As more and more people and businesses use online platforms, it’s crucial to understand what types of data need that extra layer of protection, especially when it comes to PII vs PHI vs PCI. Understanding the distinctions between PII (Personally Identifiable Information), PHI (Protected Health Information), and PCI (Payment Card Information) is crucial.

AI and LLM Data Security: Strategies for Balancing Innovation and Data Protection

Striking the right balance between innovation using Artificial Intelligence (AI) and Large Language Models (LLMs) and data protection is essential. In this blog, we’ll explore critical strategies for ensuring AI and LLM data security, highlighting some trade-offs.

ThreatQuotient Launches ThreatQ Platform Availability in AWS Marketplace

ThreatQuotient announces that its leading Threat Intelligence Platform (TIP) is now available in AWS Marketplace, a digital catalog with thousands of software listings from independent software vendors that make it easy to find, test, buy, and deploy software that runs on Amazon Web Services (AWS).

CTEM step-by-step guide | Stage one: Scoping

Welcome to our blog series on Continuous Threat Exposure Management (CTEM), where we dig into the five essential stages of implementing a robust CTEM program. Coined by Gartner in 2022, CTEM is a powerful process that can help continuously manage cyber hygiene and risk across your online environment. It’s also a lot to think about when you’re starting out, so it helps to break things down. Our series begins with the crucial first stage: Scoping.