Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Who Is Winning the War with AI: Bots vs. CAPTCHA?

For years, CAPTCHA has been the mainstay of online security, blocking bots from invading websites. Since its introduction in 2007, CAPTCHA has continued to evolve in its fight against advanced automated threats, and Google's reCAPTCHA has been at the forefront. From being highly human-friendly to highly bot-unfriendly, the game has completely changed with the introduction of AI capabilities. Thus, the sensitivity towards CAPTCHA is at high stakes with respect to its survival in the detection of bots.

A Guide to Working in Threat Intelligence

According to Gartner Research and McMillan (2003), “Threat intelligence is evidence-based knowledge, including context, mechanisms, indicators, implications, and actionable advice, about an existing or emerging hazard to assets that can inform decisions on how to respond.” Threat intelligence involves analysing data to predict and prevent cyber threats, allowing organisations to identify risks early and implement proactive defences.

What Is Two-Factor Authentication (2FA)? Definition, Types, and Benefits

Passwords alone are no longer enough to protect your IT environment. With cyberattacks becoming more sophisticated, two-factor authentication (2FA) has become essential to today’s cybersecurity strategies. It verifies who users are by requiring two different forms of identification, adding an extra layer of security to your accounts and systems.

Malaysia's Data Sharing Bill 2024: Pioneering Secure and Efficient Government Collaboration

In December 2024, Malaysia passed its Data Sharing Bill 2024, a new piece of legislation aimed at streamlining data-sharing across federal government agencies. This bill promises to revolutionize how data is managed, shared, and secured within Malaysia's government, fueling a more efficient, innovative, and secure public sector.

CIS Control 01: Inventory and Control of Enterprise Assets

Since 2008, the CIS Controls have been through many iterations of refinement and improvement leading up to what we are presented with today in CIS Controls version 8.1. CIS Controls reflect the combined knowledge of experts from every part of the ecosystem (companies, governments, and individuals). The controls reflect consideration by people in many different roles, such as threat analysts, incident responders, solution providers, policy-makers, and more.

Introducing Vulnerability Management Enhancements for Sysdig Secure: Focus on Action

Vulnerability management in the cloud is more challenging than ever. Security teams are drowning in vulnerability alerts, asked to deal with them quickly even as the list continues to expand. What they lack is a clear path to remediation. Legacy tools flood teams with critical alerts, while offering little guidance on which fixes will be most impactful. Vulnerability management isn’t just about identifying the biggest risks — it’s about taking decisive action.

Top cloud misconfigurations: A CSPM perspective

Organizations benefit from the speed of the cloud, but with great power comes great responsibility. An inadvertent cloud misconfiguration can leave the door open to bad actors. While cloud configuration issues most often stem from human error or lack of awareness, they are unfortunately a leading cause of data breaches.

New capabilities automate inbound questionnaires and demonstrate trust to customers at scale

Today's buyers are doing their homework—they want to know they can trust your business before they commit. According to Vanta’s latest State of Trust report, nearly 65% of companies say their customers, investors, and suppliers increasingly require proof of compliance before making a purchase. ‍