Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

2024 in review: A transformative year for AlgoSec in secure application connectivity

As we close out 2024, I find myself reflecting on what has truly been a transformative journey for AlgoSec. This year has been filled with ground-breaking innovation, meaningful industry recognition, and a deep commitment to our vision of secure application connectivity. It has been a year where every challenge was met with determination, every milestone became a stepping-stone toward a greater future, and every success strengthened our resolve to lead in secure connectivity.

Stealer Malware and Stealer Logs Explained

Stealer logs and the infostealers that harvest them form a key part of the threat landscape and cybercriminal ecosystem. Infostealers, which are also referred to as stealer malware, are deployed by threat actors to facilitate data theft from compromised devices. This data typically contains sensitive and valuable personal information including credentials, hardware or software information, IP addresses, browser cookies, and more.

What You Need to Know about the Delta Dental Data Breach

Delta Dental is a dental insurance provider serving over 90 million Americans. It offers coverage in all 50 states, Puerto Rico, and Washington, D.C. The company was established in 1966 in California as part of the Delta Dental Plans Association. It currently has a network of 39 independent Delta Dental companies with almost 3,000 employees.

Need to boost the value of your security budget in 2025? Here's how.

If you are like many CISOs, you feel pressure to increase the value of your security testing budget. And if you are one of the 53% of enterprises reporting stagnant or decreasing budgets in 2024, you have even more work cut out for you. Increasing testing value requires a re-evaluation of nearly everything. Tackle tool sprawl. Optimize workflows. Reduce false positives. Review cloud spend. All while demonstrating ROI even in the absence of incidents. This post is about ways to reach these goals.

Strategies for Building a Strong SOC Team and Developing Analysts

Building a strong SOC doesn’t happen overnight. It requires strategic planning, smart hiring, and a long-term vision. This is especially true when it comes to the bedrock of any successful SOC: its analysts. SOC managers play a crucial role in building, mentoring, and developing analysts to ensure the SOC is resilient and effective. If you’re a SOC manager, here are some strategies for building a strong SOC team.

Vishing Attacks: Protect Your Business from Phone-Based Threats

Vishing attacks, also known as voice phishing scams, are the newest way for cybercriminals to take advantage of weak spots. What is a vishing strike, though? Vishing is a type of social engineering scam in which people are tricked into giving up private information like passwords, credit card numbers, or business details over the phone or through voice mail. Vishing is different from phishing emails because it involves talking to people in person.

Riscosity and Microsoft Azure: A Powerful Partnership for Data Security

This collaboration is a significant step forward in making robust data security accessible to all organizations. By leveraging the Azure Marketplace, we're empowering Azure customers to easily discover, deploy, and integrate Riscosity into their existing infrastructure. This seamless integration allows for a streamlined experience and faster time to value.

Disable Core Dump Backtraces and Why

A core dump is a snapshot capturing the state of a program at the moment it crashes. This memory dump includes the processors state and the program's memory, including variables, program data, and processor registers. The data stored in core dump files, also records the contents of the system memory and CPU registers. Backtraces are generated during a program crash. They show the sequence of function calls leading to the crash called the call stack.

What you need to know about CMMC-from our Director of Government Strategy & Affairs Morgan Kaplan

The Cybersecurity Maturity Model Certification (CMMC) program was developed by the Department of Defense (DoD) to ensure that defense contractors and subcontractors meet the cybersecurity requirements needed to safely and responsibly handle government data. Of primary concern is how commercial vendors safeguard Federal Contract Information (FCI) and Controlled Unclassified Information (CUI).

Data De-identification: Definition, Methods & Why it is Important

Data is essential. Businesses, researchers, and healthcare providers rely on it. However, this data often contains sensitive personal information, creating privacy risks. Data de-identification helps mitigate these risks by removing or altering identifiers. This makes it harder to link data back to specific individuals. This process is vital for protecting sensitive information and allowing safe data use. Privacy is a growing concern. Regulations like HIPAA set strict rules.