Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

How Software Supply Chain Security Regulation Will Develop, and What Will It Look Like?

The escalation of international legislative interest in regulating the software supply chain has led to an increasing likelihood that tools such as software bills of materials (SBOMs) and AppSec solutions will become essential for companies doing business in the public sector or in highly regulated industries. However, the process of building and enforcing effective regulations presents challenges as well.

Nightfall Named A Leader in Data Loss Prevention (DLP) by G2

Nightfall has been named as a Leader in Data Loss Prevention (DLP), Sensitive Data Discovery, and Data Security in G2’s Fall ‘23 rankings. We’d like to extend a huge thank you to all the customers and supporters who made this possible. This past season, the Nightfall team has been working tirelessly to innovate new ways to keep customers safe in the cloud.

Empowering the Future of Application Security: Zenity Closes on Series A Round

I am thrilled to share some exciting news that marks a significant milestone in the Zenity journey. Today, our company has successfully closed our Series A round of fundraising, led by Intel Capital. We are thrilled to welcome Intel Capital, in addition to Gefen Capital and B5, who join our existing partners from UpWest and Vertex Ventures. Together with the Zenity team, we know this is just the beginning.

Desorden Group - The Summer 2023 Update

The financially motivated Desorden (Disorder in Spanish) group, previously known as “chaoscc”, was first observed going by the new name Desorden in 2021 while acting against multiple Asian-based organizations in various sectors. The group mainly targets high-revenue enterprises and supply chains to amass as much profit as possible by extracting sensitive organizational data and demanding a ransom for it.

Resilient networks: Building blocks of modern Cybersecurity architecture

In today's interconnected digital landscape, where data flows like a river through intricate networks, the importance of cybersecurity has never been more pronounced. As our reliance on digital networks grows, so do the threats that seek to exploit vulnerabilities in these very networks. This is where the concept of resilient networks steps in, acting as the guardians of our digital realms.

Product Quality at Rubrik - Part 1

At Rubrik, we are on a mission to Secure the World’s Data and we consider product quality a top priority. In this blog, we will talk about the automated test strategy we follow at Rubrik to ensure the best quality products for our customers. Before we deep dive into our test strategy and the process we follow, let’s quickly understand what product quality means and why it’s important to our organization as well as our customers.

Improve visibility and identify risk across your Google Cloud environments with AlgoSec CloudFlow

With expertise in data management, search algorithms, and AI, Google has created a cloud platform that excels in both performance and efficiency. The advanced machine learning, global infrastructure, and comprehensive suite of services available in Google Cloud demonstrates Google’s commitment to innovation. Many companies are leveraging these capabilities to explore new possibilities and achieve remarkable outcomes in the cloud.

What's new in Elastic Security 8.10: Scale your defenses and outpace attackers

Richer alert contextualization, generative AI in GA, ATT&CK® coverage view, cloud security posture management (CSPM) for Google Cloud, and automated CSPM onboarding for AWS accounts Elastic Security brings a MITRE ATT&CK®-aligned detection coverage view, richer alert contextualization, and extended cloud security posture management (CSPM) to Google Cloud Platform (GCP).