Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Blogs

Weekly Cybersecurity Recap March 10

It's been a rough week for major companies and the government as well, with the week finishing off with Washington D.C. lawmakers having their health information exposed. This week's attacks make it very clear that nobody is safe from cyber gangs and hackers. Dole, Dish Network, and Acer all suffered data losses this week, as well as the Crystal Bay Casino.

I caused my company's data breach. Now what?

You’ve just sat down to start your work day and you’re going through your emails, hot cup of coffee in hand. You see an email from your company’s IT department telling you to install an update ASAP. As soon as you click the link in the email, you realize you probably should have checked with IT first.

Sick of that Security Questionnaire? Automation is the Answer

Security questionnaires (SQs) are not fun. They’re time-consuming, tedious work and sometimes, they’re the one thing standing between you and a closed deal. Fortunately, the emergence of AI in the security space has resulted in many day-to-day workflows being streamlined – with SQs being one of them. Security questionnaire automation solutions have been on the rise.

Graymail and its impact on cybersecurity

Graymail – technically, it’s not bad, but it’s not necessarily good, either. This type of email falls in between. At best it’s useful, usually it’s an annoyance, and at worst, it’s a potential cybersecurity threat. The accepted definition for graymail is emails that aren’t spam or phishing, but which the recipient may perceive as inbox clutter.

National Australia Bank executes world-first cross-border stablecoin transaction, powered by Fireblocks

National Australia Bank has completed an intra-bank, cross-border transaction using NAB-issued stablecoins. This represents a world-first by a major financial institution on a layer-one public blockchain (Ethereum). The pilot transaction involved the deployment of stablecoin smart contracts for 7 major global currencies, namely Australian, New Zealand, Singapore and US dollars, Euro, Yen, and Pound Sterling.

Kubernetes Security Best Practices

Kubernetes is an open source orchestration platform for containerized workflows. It is the best way to manage – or orchestrate – large clusters of containers at scale. Sometimes abbreviated as K8s, Kubernetes helps you efficiently manage clusters of hosts running Linux containers. In the age of containers, Kubernetes has become a popular open source project and key building block for modern tech infrastructure.

VMware ESXi Servers: A Major Attack Vector for Ransomware

In our new threat briefing report, Forescout’s Vedere Labs provides details on the recent ransomware campaign targeting VMware ESXi virtualization servers, or hypervisors, and analyzes two payloads used in these attacks: variants of the Royal and Clop ransomware. We also present the tactics, techniques and procedures (TTPs) used by attackers in this campaign, discuss mitigation recommendations and list indicators of compromise (IOCs) that can be used for detection or threat hunting.

Demystifying SIEM migration: Pitfalls to avoid and tips for ensuring success

Migrating to a new security information and event management (SIEM) solution can feel like a daunting task, like moving to a new house. Over the years, a lot gets accumulated and sometimes is forgotten until found in a corner. This blog identifies steps you can take to reduce the pain typically associated with a migration, tools that can help along the way, and questions you should ask during each phase of a migration.