Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Blogs

Seeing into the future: six ways cutting-edge tech can help monitor sustainability

Haidrun’s CEO, Jonas Lundqvist, is featured in The Guardian explaining how blockchain supports traceability in the food supply chain: “In a food supply chain, for example, the record of a journey from farm to fork is available to monitor in real time, while the disclosure of data provides accountability for trading transactions and farming practices to support claims such as organic, freshness and superior quality.

Why the Right Architecture is the Cornerstone of Cloud Security

Alan Hannan is a member of the Netskope Network Visionaries advisory group. The cloud often seems like a black box for many corporate networking and security professionals. They have expertise in optimizing their internal network. Still, once they offload their traffic to the cloud, they figure they’re handing off optimization to the software-as-a-service (SaaS) provider.

The Top Cyber Attacks of July 2022

It was an exceptionally hot July in many parts of the world, and cyberspace was no exception. High profile hacks in July affected people in all walks of life, from casual gamers and social media posters to air travelers and medical patients. Still, we hate to be the bearers of exclusively bad news, so we’ve included one silver lining amongst our usual bank of dark clouds.

Top 8 Network Segmentation Best Practices in 2022

As businesses and organizations scale and grow, their network infrastructure can also grow increasingly large and complex. Using a flat network structure (all devices connected on one server) makes it easier for cybercriminals to roam freely and unimpeded in the system in the event of a successful cyber attack. Implementing network segmentation best practices can limit the scope of an attack, prevent malware from spreading, and disrupt lateral movements across your IT ecosystem.

Automated Cybersecurity for Converged IT/OT/ICS Manufacturing Environments

For decades, IT and operational technology/industrial control systems (OT/ICS) were seen as separate entities within organizations. In keeping with practices first defined by the Purdue Enterprise Reference Architecture, the two systems were entirely air gapped to never impact one another. While this separation kept OT networks more protected, it is no longer practical.

Automated incident response using Log360

Security teams are often overwhelmed with alerts daily, including false positives, and actions that require attention but might be placed on the back burner. But when alerts start stacking up and aren’t addressed promptly, important security concerns might go unnoticed and these can spiral into a data breach. The time to detect and respond to security incidents should be as short as possible to limit the time an attacker can carry out an attack.

Top 10 Software Deployment Tools for 2022

Approaching any finish line in life can be exciting yet stressful. This holds especially true in software deployment. The deployment phase is the final phase of the software development life cycle (SDLC) which puts the software into production. After a project team completes their planning, designing, and testing of a software product, the product is ready to go live.

Blindly Trusting Software Dependencies is the Opposite of Zero Trust

Trust should be earned, yet, too often, we place our trust blindly. Software is one such example. Attacks like SolarWinds, and the vulnerability discovered in the Log4j open source library should serve as the wake-up call for developers that the software supply chain is vulnerable. There are too many players in the open source supply chain, which has become increasingly interconnected and complex, and attackers are scarily good at finding openings in the nooks and crannies. Zero trust says no more.