Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

User Access Review Template (with download)

“Your entire company network was compromised, all through a single login.” That’s the reality of an employee single sign-on (SSO) breach nightmare. Hackers create fake SSO login pages in order to steal employee credentials, which can literally give them “the keys to the kingdom” – access to the most sensitive data of the organization. From a disgruntled ex-employee to a compromised user, it can become a devastating security hole. It happens more than you think.

A Challenger in the 2024 Gartner Magic Quadrant for Security Information and Event Management

In the high-stakes world of cybersecurity, complacency can spell disaster. At Sumo Logic, we don’t just adapt to the evolving threat landscape; we redefine it. Sumo Logic was recognized as a Challenger in the 2024 Gartner Magic Quadrant for Security Information and Event Management. This recent positioning reflects our Ability to Execute and Completeness of Vision. We believe this isn't just a recognition. Challenge accepted! In 2021 and 2022, Sumo Logic was recognized as a Visionary.

Security and Compliance triumphs: Vodafone Idea Leads India with SOC 2 Type 2 Attestation

In May 2024, Vodafone Idea (Vi) became the first Indian telecommunications company to achieve the SOC2 (Service Organization Control 2) Type II Attestation. This accomplishment not only underscores the company’s commitment to stringent security standards but also sets a benchmark for the entire industry.

Understanding POS Security: Protecting Your Business and Customer Data

According to the Identity Theft Resource Center’s (ITRC) 2023 Business Impact Report, 73% of small business owners in the US reported a cyber-attack within the previous year, underlining the growing popularity of small businesses as a target among malicious actors. Given this recent wave of cyberattacks, all small businesses must do their part to secure their Point of Sale (POS) systems from unauthorized parties.

The World Cybercrime Index: What is it and why is it important?

Cybercriminals are notoriously tricky to pin down. They are experts in obfuscation and misdirection, masters of avoiding consequences. Not since the early days of the Wild West have criminals managed to evade capture and maintain anonymity as effectively as modern cybercriminals do. Part of the reason for these staggeringly low conviction rates is that we usually have little idea of what country an attacker is in.

[Beware] Ransomware Targets Execs' Kids to Coerce Payouts

Just when you think bad actors cannot sink any lower, they find a way to. In a recent chilling evolution of ransomware tactics, attackers are now also targeting the families of corporate executives to force compliance and payment. Mandiant's Chief Technology Officer, Charles Carmakal, highlighted this disturbing trend at RSA last week: criminals engaging in SIM swapping attacks against executives' children.

Holistic Visibility: The Importance of Log Sources and Ingestion

You can’t secure what you can’t see goes the saying in cybersecurity. That’s why holistic visibility is so crucial for organizations tasked with staying safe in the evolving threat landscape, as it gives you full visibility into your environment. But there’s another adage that matters even more, because without access to log sources and the proper ingestion of their data, you can’t see the forest for the trees. But what are log sources? What does proper ingestion look like?

Network Hardening Guide for IT Professionals

Network hardening involves implementing measures such as configuring firewalls, securing remote access points, blocking unused network ports, removing unnecessary protocols, implementing access lists, and encrypting network traffic to mitigate unauthorized access and bolster the security of a network’s infrastructure. This process involves identifying and addressing vulnerabilities in device management and configurations to prevent exploitation by malicious actors aiming to infiltrate the network.

Revolutionizing Security: BoxyHQ's Vision for the AI Era

In today's fast-paced world dominated by AI, BoxyHQ stands at the forefront of innovation. Originally focused on developing security building blocks for developers, our journey has led us to confront the challenges of responsible AI interaction and data protection in the face of AI proliferation. Imagine a world where AI isn't just a tool but an integral part of daily life. Every decision and every interaction is shaped by algorithms and machine learning models.

A Career in Cyber Security: Navigating the Path to a Digital Safekeeping Profession

Cyber security represents not just a robust field teeming with opportunities but also an increasingly pivotal aspect of global digital infrastructure. With the prevalence of digital threats, your expertise in this domain can lead to a rewarding and socially significant cyber security career. Employers across various sectors seek professionals who can protect their data and systems, offering a broad market for your skills.