Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

Protecting Cloud Workloads with CrowdStrike and AWS

Migrating to the cloud has allowed many organizations to reduce costs, innovate faster and deliver business results more effectively. However, as businesses expand their cloud investments, they must adapt their security strategies to stay one step ahead of threats that target their expanded environment. Managing, securing and having visibility across endpoints, networks and workloads is not an easy feat. It requires a unified defense-in-depth approach.

How Cybercriminals are Leveraging Weaponized AI for Cyber Attacks

In the world of cybersecurity, artificial intelligence (AI) has changed the way we discover, respond, and recover from cyberattacks. But despite the several advancements of AI in cybersecurity, cyberattacks are becoming more and more dangerous because of AI. Cybercriminals are now leveraging existing artificial intelligence tools and AI-based technologies for use in their own attacks, and as a result, cyber threats and attacks are becoming harder to prevent.

Forward Cloud | Single Pane of Glass Demo

Forward Cloud is the single source of truth (and pane of glass) for hybrid multi-cloud networks. Forward Enterprise allows Networking, Security, and Cloud professionals to look at the same data when troubleshooting or verifying network behaviors. The single pane of glass model delivers actionable information in an intuitive, vendor-agnostic manner.

Will the Cloud Kill Security Agents?

The “agents or no agents” debate is ancient and eternal. Every decade or so, we go through another round of “agents are terrible, let’s end them” and “we need more visibility and control to secure the system, maybe we’ll call it a ‘sensor’ this time.” We ultimately always land on the same conclusion. There are no silver bullets. Today, the debate is alive and well because cloud is the new frontier, so surely agents are dead this time?

How to Encrypt S3 Buckets Automatically with Torq

S3 buckets without encryption can leave sensitive data exposed and at risk. As a best practice and to meet a number of industry and governmental regulations, it’s important to ensure that S3 server side bucket encryption has been properly applied at all times. To do this, many security teams rely on their Cloud Posture Security Management (CSPM) platform and/or AWS GuardDuty to monitor their AWS resources and provide alerts when an S3 bucket is found unencrypted.

Lookout Obtains FedRAMP JAB P-ATO for SASE: What It Means for You

While the pandemic brought on unprecedented challenges related to full-scale telework, it has also moved cybersecurity to the top of the U.S. government’s agenda. I have been very encouraged by the various actions taken by the Biden administration, beginning with the May 2021 executive order directing federal agencies to rapidly adopt a Zero Trust architecture.

Don't Become a Cybersecurity Meme: 31 Funny But Sad Security Memes About Internet Privacy

Online privacy is no laughing matter, until it is. Now, we’re very serious about fundamental human digital rights and we work day and night to make sure our users' data is wrapped up safe and sound. But that said, sometimes you need to take a step back and relax. Yes, how corporations and governments track us online is horrifying. Of course, the erosion of personal privacy and individual freedoms is worrying. And yeah, the world and the internet are in rough shape right now.

IoT Security: How Important are Logs for System?

IoT has rapidly moved from a fringe technology to a mainstream collection of techniques, protocols, and applications that better enable you to support and monitor a highly distributed, complex system. One of the most critical challenges to overcome is processing an ever-growing stream of analytics data, from IoT security data to business insights, coming from each device. Many protocols have been implemented for this, but could logs provide a powerful option for IoT data and IoT monitoring?