Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Blogs

SafeBreach Coverage for US-CERT Alert (AA23-165A) - LockBit Ransomware

On June 14th, the Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), the Multi-State Information Sharing and Analysis Center (MS-ISAC) along with its international cybersecurity partners released an advisory calling out the various indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) being leveraged by the LockBit ransomware operation over the past 3 years.

Why IAM maturity is key to accessible cyber insurance

Cyber insurance is an increasingly critical part of an organization's approach to cyber defense and CISOs have realized that identity management and, in particular, Privileged Access Management (PAM) are some of the most important and influential aspects of any organization’s overall cybersecurity strategy.

Security Guidance from the Front Lines of Cloud Incident Response

In our first-ever Cloud Threat Summit, CrowdStrike’s Senior Vice President of Intelligence and Senior Director of Consulting Services discussed the most common ways adversaries breach the cloud and the steps organizations can take to stay safe.

The definitive guide to compliance with cloud-managed Kubernetes

Kubernetes has become a vital component in cloud-native infrastructure, enabling organizations to deploy and manage containerized applications at scale. However, compliance is crucial to modern infrastructure, especially for businesses that handle sensitive data. Organizations that adopt Kubernetes must thus also be sure to maintain the security of their infrastructure, as well as address compliance requirements to meet regulatory standards.

Kubernetes compliance under GDPR

The General Data Protection Regulation (GDPR) is a data privacy and security regulation in the European Union (EU) that aims to protect individuals’ personal data collected and processed by businesses. The financial penalties for a company that is found to be non-compliant with GDPR can be significant: €20 million or 4% of its annual global revenues.

Guarding Your Transactions: Tackling Rogue Payment Terminals for Payment Acquirers

You’re in your favorite coffee shop, which you’ve frequented for years. The barista knows your order by heart – a medium, iced, sugar-free vanilla latte with soy milk. As you pay for your coffee, you casually chat with the staff about the weather, completely oblivious that you’ve just been the victim of fraud.

ChatGPT Use is Increasing Exponentially in the Enterprise

ChatGPT is a language model that generates fluent, contextually relevant responses to prompts in a conversational fashion. Because it can generate fluent text in multiple languages, it is gaining popularity among enterprise users who are using it to help with the writing process, to explore new topics, and to write code.

Strengthening the Shield: Best Practices for Application Security

In an ever-evolving threat landscape, safeguarding the integrity of applications is a real concern. The consequences of a single security breach can be devastating, leading to data links, financial losses, and irreparable damage to a company’s reputation. Organizations across industries must equip themselves with reasonable defense mechanisms to fortify their applications against malicious actors.

The Cybersecurity Risks of AI & How to Safeguard Sensitive Data

Experts in the cybersecurity industry are becoming increasingly concerned about artificial intelligence attacks. A 2020 report from Forrester Consulting found that 88% of decision-makers in the security industry believed offensive AI was on the horizon, and almost two-thirds of them expected AI to lead new attacks.