Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Understanding the human-centered approach for cloud network security with GigaOm's 2024 insights

2024 just started but cloud network security insights are already emerging. Amongst all the research and insights GigaOm’s comprehensive research emerges as a vital compass. More than just a collection of data and trends, it’s a beacon for us – the decision-makers and thought leaders – guiding us to navigate these challenges with a focus on the human element behind the technology. GigaOm showcased indicators to where the market is heading.

Enhancing container security: A comprehensive overview and solution

In the rapidly evolving landscape of technology, containers have become a cornerstone for deploying and managing applications efficiently. However, with the increasing reliance on containers, understanding their intricacies and addressing security concerns has become paramount. In this blog, we will delve into the fundamental concept of containers and explore the crucial security challenges they pose.

Your Complete Guide to Cloud Security Architecture

In today’s digital world, is your data 100% secure? As more people and businesses use cloud services to handle their data, vulnerabilities multiply. Around six out of ten companies have moved to the cloud, according to Statista. So keeping data safe is now a crucial concern for most large companies – in 2022, the average data leak cost companies $4.35 million. This is where cloud security architecture comes in.

Navigating the threat landscape of LockBit

Imagine a virtual phantom slipping through digital shadows, silently locking away data, and leaving a haunting message demanding a ransom. That is LockBit ransomware, the stealthy troublemaker in the world of cybersecurity. In this blog, let’s unpack the mysteries of LockBit: how it sneaks in and wreaks havoc and why businesses should be on high alert.

How To Automate Incident Response with SentinelOne and Torq

One of the superpowers of the Torq Hyperautomation platform is the ability to integrate with anything. We team up with leading security vendors to combine forces to create automations that make SOC analysts’ lives easier while also improving their organizations’ security posture. In this post, we’ll talk about how the enterprise-grade Torq Hyperautomation platform integrates with SentinelOne to level up your organization’s SOC workflows with autonomous incident response.

Russian State-Sponsored Threat Actor Targets High Profile Individuals in Phishing Campaign

The Russian state-sponsored threat actor “COLDRIVER” is launching phishing campaigns against “high profile individuals in NGOs, former intelligence and military officers, and NATO governments,” according to researchers at Google’s Threat Analysis Group (TAG). “COLDRIVER continues its focus on credential phishing against Ukraine, NATO countries, academic institutions and NGOs,” TAG says.

AI Does Not Scare Me, But It Will Make The Problem Of Social Engineering Much Worse

I am not scared of AI. What I mean is that I do not think AI is going to kill humanity Terminator-style. I think AI is going to be responsible for more cybercrime and more realistic phishing messages, but it is already pretty bad. Social engineering, without AI, is already involved in 70% - 90% of successful cyber attacks.

Facebook Phishing Scams Target Concerned Friends and Family

BleepingComputer describes a phishing scam that’s been running rampant on Facebook for the past several months, in which threat actors use hacked accounts to post links to phony articles implying that someone has been killed in an accident. The Facebook posts have captions like “I can't believe he is gone,” accompanied by thumbnails of news articles involving car accidents or crime scenes.

Employment Verification & Background Verification Process - What's new

Background verification involves gathering details about a candidate’s work history, criminal record, academic qualifications, and proof of residence. This step is critical in the lengthy and intricate process of hiring and onboarding. It means that applicants might experience a delay as employers thoroughly review their employment backgrounds. The transition from completing background checks to reaching a “good to hire” decision usually spans 3-5 days.