Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How To Get Real-Time Notifications for Denied Traffic With Prometheus and AlertManager

Network policies are essential for securing your Kubernetes clusters. They allow you to control which pods can communicate with each other, and to what extent. However, it can be difficult to keep track of all of your network policies and to ensure that they are configured correctly. This is especially true if you have a large and complex cluster with more than 100 nodes. One way to address this challenge is to leverage Prometheus and AlertManager embedded in Calico Enterprise/Cloud.

Harnessing Telemetry Data: Strategies for Success

Are you leveraging every piece of data to protect your network? Telemetry data is the automated process of collecting and sending data from remote points to an IT system for monitoring and analysis. Telemetry empowers companies to detect anomalies, predict potential breaches, and respond to threats faster.

Elastic integrates Anthropic's Claude 3 models to enhance AI-driven security analytics

For security analysts navigating an increasingly complex threat landscape, the ability to quickly identify and respond to attacks is critical. Security information and event management (SIEM) tools have been integral to helping security teams quickly respond to attacks. Now, in the era of generative AI, Elastic is changing the game by delivering AI-driven security analytics to replace SIEM and modernize the SOC.

The Human Element of Email Security: Understanding Behavioral Threats and Social Engineering

Behavioral threats and social engineering attacks target the human psyche rather than exploiting technical vulnerabilities. They rely on psychological manipulation, deception, and exploiting human trust to trick individuals into divulging sensitive information, clicking on malicious links, or taking actions that compromise security. Understanding these tactics and the human behaviors they exploit is key to effectively mitigating email security risks.

9 in 10 Organizations Paid At least One Ransom Last Year

New analysis of cyber attacks shows ransomware attacks are running far more rampant than previously thought, with half of organizations blaming poor cyber hygiene. After last year’s shocking stat that 70% of organizations pay the ransom, it’s really surprising to see that an even greater percentage (91%) have paid a ransom at least once in the last 12 months – this according to Extrahop’s 2024 Global Cyber Confidence Index.

KnowBe4 Earns Multiple 2024 Best Of Awards From TrustRadius

KnowBe4 is proud to be recognized by TrustRadius for our Security Awareness Training and PhishER platforms. KnowBe4's Security Awareness Training won in the Security Awareness Training category and PhishER won in Incident Response, Security Orchestration, Automation and Response and the Phishing Detection and Response categories.

The 2024 Cybersecurity Excellence Awards Recognizes archTIS Products as Winners in Data-centric Security and National Cyber Defense

archTIS is excited to share that the company has been honored with two significant awards in the 2024 Cybersecurity Excellence Awards. Our products, Kojensi and NC Protect, have been recognized in the National Cyber Defense and Data-centric Security categories. We are proud to be acknowledged by the Cybersecurity Excellence Award judges for our commitment to excellence, innovation, and leadership in cybersecurity.

K-12 Cybersecurity: The Growing Threat Schools Face

Classrooms have never been more connected. Many students are issued laptops or tablets instead of textbooks, while teachers and administrators rely on dozens of apps and connected devices like Smartboards to provide instruction, track grades, manage bus schedules, create budgets, and orchestrate countless other school-related activities.