Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

How Artificial Intelligence Keeps Us Safe Online: 6 Examples

Protecting our digital information comes before its usage. Fortunately, we have artificial intelligence to take care of online security. Today, AI stands among the top cyber security initiatives, and companies admit they see the benefit. Let's explore how AI enhances our defenses with straightforward examples.

Centripetal Named Winner of the Coveted Global InfoSec Awards during RSA Conference 2024

Centripetal is proud to announce that it has won the Next Gen Intelligence Powered Security award from Cyber Defense Magazine (CDM), the industry's leading electronic information security magazine.

What's an Identity Provider (IdP)?

You could have the strongest firewalls, encryption, anti-malware, vulnerability scanners, and risk management tools in the world and still leave one critical gap in your cybersecurity infrastructure — insider threats. And most of those threats come from poor identity management. But what, exactly, is good identity management? How do you pick the right identity provider for your organization?

Best API Security Product: Wallarm wins 2024 Cybersecurity Excellence Award

We are thrilled to announce that Wallarm has clinched the sought-after 2024 Cybersecurity Excellence Award, under the category Best API Security Product. Our unwavering commitment to pioneering solutions that safeguard digital ecosystems, and fortify API security amidst the evolving cyber threat landscape, has garnered industry-wide recognition. This accolade reaffirms Wallarm's position at the forefront of cybersecurity innovation, empowering businesses with confidence and resilience.

Why We Should Have Zero Trust in a Hybrid Public Sector Workforce

Those working in the UK public sector have seen significant upheaval over the last decade thanks to a combination of the long-term efforts to relocate civil servants outside London and, in recent years, the swift adoption of hybrid work practices necessitated during the pandemic. As a result, networks have expanded, the number of devices and endpoints to protect has grown considerably and potential vulnerabilities for attackers to target have increased.

What is the MITRE ATT&CK

The MITRE ATT&CK framework provides the cybersecurity community with information on more than 100 threat actor groups and the platforms they target. The data within the framework comes from publicly available cyber threat intelligence and reports and security teams and threat researchers. ATT&CK is available for free to anyone who wants to use it.

What Is Security Automation?

Digital transformation initiatives like moving servers to the cloud, extending work-from-home privileges, and deploying more IoT devices have expanded attack surfaces, making it easier than ever for threats to slip through. At the same time, the number of cyber threats is growing fast. According to Security Magazine, a cyberattack now happens at least every 39 seconds.

Integrating Snyk Code SAST results in your ServiceNow workflows

Application security teams often lack the crucial information and visibility needed to find, prioritize, and remediate risks in their most business-critical applications. To solve this application security challenge, ServiceNow and Snyk have partnered to provide a singular view of the risk within these applications — exposing the severity and criticality of vulnerabilities while providing actionable workflows to boost your overall security posture.