Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

OCSF for Security Hub: Sumo Logic and AWS speaking the same language

In technology, the proof of a lasting relationship is in the infrastructure — the pipelines, security services, and log plumbing have to work seamlessly together long before anyone sees the outcome. That’s precisely what Sumo Logic and AWS have built. Aligned around open standards like OCSF (Open Cybersecurity Schema Framework), integrated with services like Security Hub and GuardDuty, and connected through shared telemetry, it makes cloud security and observability possible at scale.

Faked Out: How a Fraud IRS Website Fueled a Sophisticated Remote Access Campaign

The BlueVoyant Security Operations Team (SOC) and Threat Fusion Cell (TFC) researchers recently analyzed a sophisticated phishing incident where a user was lured into visiting a fake IRS website to verify a “tax refund”. The scheme was initiated via a phishing email, leading the user to the fraudulent site.

Six workflows every financial services security team should be automating

Security teams in financial services and insurance (FSI) companies have their work cut out for them. These organizations safeguard some of the most important data in the world—making them prime targets for attackers and among the most heavily regulated industries to operate in. Breach costs in finance remain among the highest of any sector, averaging $6.08M per incident in 2024. At the same time, many teams juggle dozens of disconnected systems and legacy platforms.

How to choose compliance audit software: A buyer's guide

With regulatory complexity rising across all industries, managing multiple frameworks and amended regulations simultaneously has become the new security standard. Regular audits and continuous improvement have also become essential, both to ensure ongoing compliance and to strengthen customer trust. ‍ However, manual compliance audits are time- and resource-intensive. Their complexity grows with each new framework, significantly raising the risk of human error and compliance fatigue.

How Falcon ASPM Secures GenAI Applications and Lessons from Dogfooding

The widespread availability of large language models (LLMs) has driven the rapid development of generative and agentic AI applications for business use cases. These systems can reason, plan, and act autonomously, creating security risks that traditional security tools weren’t built to handle. Their popularity has widened the attack surface, both for organizations using external LLMs and those building their own GenAI applications.

Got a text about an Amazon refund? It might be a scam

Amazon refund text scams are on the rise. Learn how to spot the scam and keep your info safe. You get a text saying you’re owed an Amazon refund. Sweet, right? Not so fast. If it’s the Amazon refund text scam, that sweet deal could cost you more than you think. Here’s how to protect your devices with Avast Free Antivirus. Amazon refund text scams have garnered quite a lot of attention recently.

Internxt Meet Is Now Available! Host Video Calls in Total Privacy

Internxt Meet has joined our product suite, allowing you to combine secure, private cloud storage with private video calling. Meet is your new alternative to Teams, Google Meet, and more. Now you can host video calls knowing that the privacy of your calls is completely protected with post-quantum encryption. Meet is available for all Ultimate plans, which also gives you access to.

Secure Your Software Supply Chain: A CISO's Imperative in the SDLC

From customer-facing applications to internal systems, your businesses run on code. As CISOs, you may know that this reliance comes with a growing, complex challenge: securing the Software Development Lifecycle (SDLC) from end to end, especially against the insidious threat of software supply chain attacks.

The 3 Biggest Email Security Challenges Facing Legal Organizations

Law firms really are under constant pressure to meet tight deadlines, maintain client confidentiality and protect privileged communications. And like most aspects of life with technology so deeply intertwined, the same tools that make work possible can also be significant sources of risk. Consider something as basic as email; likely the most commonly used tool in the profession.

Build vs. Buy Access Control: Why Apono Is the Smarter Choice for Cloud & Security Teams

Security and engineering teams today face a tough balance: protecting sensitive resources while keeping developers productive. As organizations shift from on-prem to the cloud, access management becomes one of the biggest challenges. With more identities—human and non-human—gaining access to more resources across hybrid environments, the risks rise.