Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

The ultimate guide to creating a secure Python package

Creating a Python package involves several actions, such as figuring out an apt directory structure, creating package files, and configuring the package metadata before deploying it. There are a few other steps that you need to follow including creating a subdirectory for tests and clear documentation. Once the package is ready, you can distribute it to various distribution archives. With that, your Python package will be ready for others to install and use.

How To Get Real-Time Notifications for Denied Traffic With Prometheus and AlertManager

Network policies are essential for securing your Kubernetes clusters. They allow you to control which pods can communicate with each other, and to what extent. However, it can be difficult to keep track of all of your network policies and to ensure that they are configured correctly. This is especially true if you have a large and complex cluster with more than 100 nodes. One way to address this challenge is to leverage Prometheus and AlertManager embedded in Calico Enterprise/Cloud.

Harnessing Telemetry Data: Strategies for Success

Are you leveraging every piece of data to protect your network? Telemetry data is the automated process of collecting and sending data from remote points to an IT system for monitoring and analysis. Telemetry empowers companies to detect anomalies, predict potential breaches, and respond to threats faster.

Elastic integrates Anthropic's Claude 3 models to enhance AI-driven security analytics

For security analysts navigating an increasingly complex threat landscape, the ability to quickly identify and respond to attacks is critical. Security information and event management (SIEM) tools have been integral to helping security teams quickly respond to attacks. Now, in the era of generative AI, Elastic is changing the game by delivering AI-driven security analytics to replace SIEM and modernize the SOC.

The Human Element of Email Security: Understanding Behavioral Threats and Social Engineering

Behavioral threats and social engineering attacks target the human psyche rather than exploiting technical vulnerabilities. They rely on psychological manipulation, deception, and exploiting human trust to trick individuals into divulging sensitive information, clicking on malicious links, or taking actions that compromise security. Understanding these tactics and the human behaviors they exploit is key to effectively mitigating email security risks.

9 in 10 Organizations Paid At least One Ransom Last Year

New analysis of cyber attacks shows ransomware attacks are running far more rampant than previously thought, with half of organizations blaming poor cyber hygiene. After last year’s shocking stat that 70% of organizations pay the ransom, it’s really surprising to see that an even greater percentage (91%) have paid a ransom at least once in the last 12 months – this according to Extrahop’s 2024 Global Cyber Confidence Index.

KnowBe4 Earns Multiple 2024 Best Of Awards From TrustRadius

KnowBe4 is proud to be recognized by TrustRadius for our Security Awareness Training and PhishER platforms. KnowBe4's Security Awareness Training won in the Security Awareness Training category and PhishER won in Incident Response, Security Orchestration, Automation and Response and the Phishing Detection and Response categories.