Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

First American Data Breach in December Impacts 44,000 Individuals

In an alarming revelation, First American Financial Corporation, the second-largest title insurance company in the United States, disclosed that a cyberattack in December resulted in a significant data breach affecting 44,000 people. This incident underscores the importance of robust cybersecurity measures and services such as phishing takedown, online risk evaluation, stolen credentials detection, and darknet monitoring.

An Introduction To Purple Teaming

With cyber threats constantly evolving, organizations must ensure that their approach to identifying and mitigating vulnerabilities is always up to date. Purple teaming can play a vital role in helping them to achieve this. Purple teaming involves red and blue teams collaborating on an ongoing basis to maximize their impact. Read on to discover how purple teaming enables businesses to enhance and accelerate their approach to identifying and mitigating security vulnerabilities.

Wireshark: Ethereal Network Analysis for the Cloud SOC

Remember Wireshark from the good old days of your IT degree or early engineering adventures? Well, guess what? It’s still kicking and just as relevant today as it was back then, and guess what else? It is still open source! Do your engineering or security teams use it? There’s a good chance they do if you’re on-premises. Believe it or not, Wireshark isn’t just for the land of wires and cables anymore. With some help from Falco and Kubernetes, it has a place in the cloud SOC.

The Top 5 Areas of Your IT Ecosystem to Monitor in 2024

In today’s complex IT ecosystems, extending equal protection across the entire network is simply not feasible. Instead, organizations need to determine which systems are inherently most critical and prioritize maintaining their operational integrity through effective IT monitoring: tracking performance and activity across servers, applications and other technology components.

Delivering a Modern Approach to SaaS Security with Netskope One

There are more SaaS applications in use by businesses than ever before—and the adoption rate is only going to continue to increase. According to Netskope’s annual Cloud & Threat Report, SaaS adoption continued to rise in enterprise environments throughout 2023, with users constantly accessing new, mostly unmanaged, apps and increasing their use of existing apps.

Operation Grandma: A Tale of LLM Chatbot Vulnerability

Who doesn’t like a good bedtime story from Grandma? In today’s landscape, more and more organizations are turning to intelligent chatbots or large language models (LLMs) to boost service quality and client support. This shift is receiving a lot of positive attention, offering a welcome change given the common frustrations with bureaucratic delays and the lackluster performance of traditional automated chatbot systems.

What Udemy is building with AI in Tines

For the security team at Udemy, AI in workflow automation provides an opportunity to unlock new time savings while keeping their organization secure, and protecting their online learning and teaching marketplace of 62 million users. But like all good security teams, they don’t want to sacrifice data security or privacy. AI in Tines, which is secure and private by design, provides that all-important layer of control - data never leaves the region, travels online, is logged, or is used for training.

Introducing AI in Tines

Everyone in the market is talking about AI right now. It’s a modern marvel; some say it might even be as big as the Industrial Revolution. We’re not big on grandiose statements like that, but we are big on delivering products that help our customers be more efficient and secure and, as a result, have happier and more engaged teams. That’s why today, we’re excited to announce AI in Tines. Two powerful features to make Tines even more accessible to any member of your organization.

Monitor DNS logs for network and security analysis

The Domain Name System (DNS) translates domain names (e.g., datadoghq.com) into IP addresses via a process called DNS resolution. This translation facilitates all kinds of network communication, from enabling web browsers to connect to a desired page without requiring users to remember IP addresses, to internal communication across private infrastructure, such as Kubernetes environments.