Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Reaching Peak Understanding of IoT and ICS Risk

In a world where internet connectivity intersects with just about every facet of our physical world—from cameras and door locks to power grids and factory robots—cyber risk intelligence has moved well beyond just protecting the bits and bytes of logical IT ecosystems. Security and risk professionals also have to be on the lookout for and aware of improperly secured cyber physical devices, like IoT devices, which greatly expand the enterprise attack surface.

Get Ahead of Digital Impersonation with Brand Threat Intelligence

Trust isn’t just a nice-to-have. It’s the foundation your organization is built on, fueling everything from customer loyalty to stronger partnerships and confident employees. But today, trust must be built across more digital channels than ever: websites, social platforms, app stores, and much more.

7 King-Sized Ways Financial Services Firms Can Maximize Cyber-Treats and Avoid Cyber-Tricks for Cybersecurity Awareness Month 2025

October is a season of pumpkins, haunted houses, and that neighbor who puts up twelve-foot skeletons way too early. But for those of us in financial services, October has another spooky significance: Cybersecurity Awareness Month. And unlike a cheap jump scare at the local haunted house, the threats we face in financial data management aren’t imaginary.

How To Compare PAM Solutions on the Market

Privileged Access Management (PAM) is an essential part of modern enterprise security, helping organizations monitor and control privileged access to systems with sensitive information. As companies scale their infrastructure across on-premises, hybrid and cloud environments, selecting the right PAM solution can have a long-term impact on enforcing compliance and reducing security risks.

Corelight reconnects visibility across the entire AWS cloud environment

Today, we are pleased to announce the launch of Corelight’s new AWS Flow Monitoring Sensor, a new addition to Corelight’s flow monitoring capabilities. This new sensor was purpose-built to address the longstanding visibility challenges that have frustrated security teams running their most critical workloads in AWS. AWS provides one of the world’s most popular cloud platforms, hosting applications and sensitive data for some of the largest organizations.

VM Backup Gets Cloud-Native: How Spectro Cloud and CloudCasa Make It Actually Work

For years, backing up virtual machines has been a necessary evil — a dull, repetitive chore hidden deep inside IT maintenance schedules. It’s the sort of thing that keeps enterprise workloads safe but rarely excites anyone. You’d spin up VMs, configure snapshots, cross your fingers before a restore, and hope that your “incremental forever” backup didn’t quietly break somewhere along the way. But lately, something has started to shift.

CISA Emergency Directive 2503: What It Means for Cisco ASA and Firepower Devices

CISA Emergency Directive 25‑03 mandates that federal civilian executive branch (FCEB) agencies immediately identify and mitigate vulnerabilities in Cisco ASA and Firepower devices. The vulnerabilities, which affect SSL VPN components, can be exploited by attackers to gain unauthorized access and pivot across networks. CISA’s actions are based on observed exploit activity in the wild and the critical role these devices play in public sector infrastructure.

A CISO's Guide to the DoW's New CSRMC Framework

The Department of War’s (DoW) new Cybersecurity Risk Management Construct (CSRMC) marks a watershed moment for cyber defense. This move confirms that static, checklist-based security is obsolete. To defend against modern threats, organizations must adopt the continuous and proactive posture management approach experts have been recommending for years.

Understanding the Colt Attack

As Jaguar Land Rover (JLR) announces a return to operations after a six-week disruption, a lengthier, less publicised UK-based cyber-attack recovery remains unresolved. Perhaps the relative quiet is because Colt Technology Services, a critical connectivity and trading network serving major banks and stock exchanges in ~30 countries, is not a household name like JLR, Co-Op, or M&S. Or perhaps it’s because the narrative doesn’t fit the now-expected Scattered Spider storyline.

API Attack Awareness: When Authentication Fails - Exposing APIs to Risk

Authentication issues seem like low-level attacks. But authentication today – especially API authentication – can be more difficult than people expect. Companies rely on APIs to carry sensitive information every day. If access to those APIs is not properly secured, all the sophisticated security solutions companies use to protect their data elsewhere are completely undermined.