Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Blogs


Top Five Reasons To Use CloudCasa With Azure

CloudCasa by Catalogic announced the integration with Azure Kubernetes Service (AKS) at KubeCon in Valencia and it has so far received positive feedback from customers. In this episode of TFiR Let’s Talk, Swapnil Bhartiya sits down with Sathya Sankaran, Founder and General Manager, CloudCasa by Catalogic and Sebastian Głąb, CloudCasa Architect, as they give a demo and explain the key reasons to use CloudCasa to protect AKS Applications.

Arctic Wolf

16 Threat Intelligence Terms Everyone Should Know

Understanding the ins and outs of threat intelligence can be complicated for an organization. If your business is anything but cyber, it’s understandable to be overwhelmed by terms like ransomware, cryptocurrency, and DDoS attacks, especially in relation to your systems and assets. That’s okay.


Why Students Need a Password Manager

Keeping track of your assignments in school isn’t easy, but keeping track of your passwords is even harder. Students could benefit from using a password manager because it makes it easy to create, store and secure their passwords, documents and sensitive data all in one place. Read on to learn why a password manager would be useful for students.


How to stop PS5 scalpers this Black Friday

The PlayStation 5 has been in high demand since its November 2020 launch day. Supply chain issues stemming from the Covid-19 pandemic and trade war between China and the US have led to an ongoing global shortage of computer chips. Sony simply can’t keep up with demand for its newest console. This demand has created a huge opportunity for product scalpers. The PS5 remains one of the most targeted products by scalper bots two years after its launch.


Sanction Screening: a comprehensive guide to help financial institutions fulfil sanction compliances.

Financial institutions use sanctions screening as a tool to detect, prevent and manage sanctions imposed on individuals and entities. Sanctions are issued on entities, organizations and individuals who are deemed drug dealers, human traffickers, terrorists and smugglers by the respective country or the U.N.


Insiders cause 20% of data breaches

Apart from external attackers, organizations need to consider another type of threat when planning their cybersecurity strategy: insider threats. There are different types of insiders. On the one hand, there are people who have secret knowledge and unintentionally create risk openings within an organization; and on the other, there are others who intend to cause harm, motivated by profit, extortion, or personal grievance. This means insiders can be classified as follows.

Featured Post

Zero Trust is not a shortcut to security

According to a recent Microsoft report, Zero Trust is now 'the top security priority' for 96% of the interviewed security decision makers, while 76% said they were currently in the process of implementation. Microsoft's report also says that the biggest challenges facing adoption are perceived investment and effort to achieve the principle in practice. Sounds familiar, but the reality of Zero Trust is that, for the most part, it's nothing new.

Overheard at the SANS Security Awareness Summit 2022

People have become the primary attack vector for cyber attackers around the world. As the Verizon Data Breach Investigations Report 2022 indicates, it is humans rather than technology that now represent the greatest risk to organizations. According to the SANS 2022 Security Awareness Report, the top three security risks that security professionals are concerned about are phishing, business email compromise (BEC) and ransomware, all closely related to human behavior.


Understanding Cyber Threat Intelligence

“If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.” – Sun Tzu. The above quote by Sun Tzu summarizes cyber threat intelligence (CTI) perfectly.

Arctic Wolf

Insight Into The Strengthening America Cybersecurity Act

Signed into law in March of 2022, the Strengthening American Cybersecurity Act (SACA) gives federal authorities an overview of all cyber attacks against critical infrastructure in the United States for the very first time. SACA has three parts: SACA comes at a time when governments are facing a significant paradigm shift.