Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Cato CTRL Issues New SASE Threat Report

Threat actors are always evolving. Whether it is nation-state actors, cybercrime groups, ransomware gangs, or niche teams targeting specific systems – new tools, techniques, and procedures are constantly introduced by attackers. Stopping those threats is challenging in large part because Cyber Threat Intelligence (CTI) remains fragmented.

Asset hijacking: the digital supply chain threat hiding in plain sight

The digital supply chain refers to the chain of third-party digital tools, services and infrastructure that is depended on for a particular first-party service (such as your website or SaaS platform). In an ever-changing digital landscape, supply chains can be brittle with many unseen risks. The nature of supply chain risk is transitive; any part of the often long and complicated digital supply chain can be compromised, causing all components downstream of it to also be compromised.

Building Generative AI Solutions At Egnyte

The rise of Generative AI models has sparked a transformative shift across industries, offering unprecedented capabilities in automating tasks, enhancing decision-making, and fostering innovation. As publicly available tools, these models promise a democratization of technology, suggesting that any company can leverage them to boost efficiency and creativity. However, the reality of integrating and optimizing these AI models for specific corporate needs is far from plug-and-play.

HIPAA Compliance For Email

In the current era of digital technology, email has become an essential means of communication in the healthcare sector. It helps simplify processes, fosters teamwork, and enhances the quality of patient care. However, it is important that the confidential patient data is kept secure, and all communications are done as per the HIPAA compliance email procedures.

Next-Generation SIEM: Corelight is the Data of Choice

For years, the mantra for achieving visibility into potential threats has been the trio of EDR, NDR, and SIEM. These components form the foundation of a robust security posture, with EDR and NDR offering the depth and breadth needed to monitor activities across endpoints and networks.

Navigating VMware changes: How to minimize upheaval and keep your business moving forward (Webinar)

The word “disruption” gets thrown around a lot when discussing the tech industry. Disruptive technologies. Disruptive ideas. Disruptive companies and business models. Even “disruptive innovation” or its younger cousins, “big-bang disruption” and “new-market disruption.” The list goes on … and on.

Enabling GenAI with AI-infused API Security

GenAI has the promise to transform companies, and introduce a lot of security risk. One of the main benefits of GenAI relates to the modernization of apps. Most companies are going through some type of app modernization. They are responding to the market by delivering better and better experiences to their customers. This is largely done through the experience people have with their apps. This ranges from banking to healthcare to travel and everywhere in between.

Accelerating AppSec with Mend.io and Sysdig

Today at RSA Conference 2024, Mend.io and Sysdig unveiled a joint solution targeted at helping developers, DevOps, and security teams accelerate secure software delivery from development to deployment. The integration incorporates the exchange of runtime insights and application ownership context between Sysdig Secure and Mend Container to provide users with superior, end-to-end, and risk-based vulnerability prioritization and remediation across development and production environments.

Why Is Cyber Resilience Essential and Who's Responsible for It?

In the first installment of our series on cyber resilience, we discussed what being a resilient organization means. In this installment, we'll explore why organizations need to consider how to become resilient, who's responsible for achieving this, and the processes organizations must have to prioritize actions and effectively spend their budgets.