Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

3 Considerations for Navigating Australian IRAP Assessments

Aligning with the Australian Government’s expectations for cybersecurity can present challenges, especially for organizations unfamiliar with the frameworks in use. For those looking to work with or support government programs, understanding how systems are assessed against the Information Security Manual (ISM) is critical. The ISM, maintained by the Australian Signals Directorate (ASD), sets out cybersecurity principles to guide the protection of government information and systems.

You've Embraced Kubernetes. Now Comes the Hard Part: Protecting Kubernetes

You’ve made the leap. Kubernetes is up and running. You’ve reduced your hypervisor footprint, containerized your workloads, and unlocked new levels of agility. But now the Day 1 operations are behind you—the real challenge surfaces: protecting Kubernetes. How do you protect this dynamic, fast-moving environment without slowing down your team, racking up hidden costs, or duct-taping together a fragile backup system?

Choosing a DDoS Mitigation Strategy: How NDR Helps Identify and Contain DDoS Attempts

In today’s digital battlefield, distributed denial-of-service (DDoS) attacks remain one of the most disruptive tactics used by threat actors. These attacks are not just about overwhelming servers they’re about business downtime, customer dissatisfaction, and reputation loss. With the increasing complexity of attack vectors, traditional DDoS mitigation strategies are no longer enough. Enterprises must adopt smarter, faster, and more adaptive ways to detect and mitigate DDoS attacks.

Alert: Scattered Spider is Targeting the Aviation Sector

The US FBI and cybersecurity experts are warning that the Scattered Spider extortion gang has shifted its focus to the aviation and transportation sectors, BleepingComputer reports. The group spent the past several months targeting companies in the retail and insurance sectors, and has now hit several airlines. Scattered Spider uses social engineering attacks to gain initial access, then steals data and/or deploys ransomware to extort their victims.

AI Attacks Are Coming in a Big Way Now!

AI is going to allow better, faster, and more pervasive attacks. For a few years, if you attended one of my presentations involving AI, I would tell you all about AI and AI threats…perhaps even scare you a bit…and then tell you this, “AI attacks are coming, but how you are likely to be attacked this year doesn’t involve AI. It will be the same old attacks that have worked for decades.” I always got lots of comforted smiles from those ending lines. But this year is different.

Ten new and updated apps for securing and monitoring your environments

Whether you rely on Sumo Logic for securing your systems, monitoring your infrastructure, or maximizing application performance, connecting to your tech stack is essential. That’s why we continuously release new apps and upgrade existing ones, ensuring you can easily connect to your stack and visualize key data with out-of-the-box dashboards. Let’s dive into some of the latest additions to our app catalog, designed to help you monitor, secure, and optimize your environment.

A 7-step Essential Eight compliance checklist

Implementing Essential Eight (E8) is mandatory for in-scope organisations, such as government agencies, critical infrastructure providers, and other non-corporate Commonwealth entities (NCEs). ‍ Even if your organisation isn’t scoped by the framework, aligning with E8 is recommended because it outlines the baseline requirements for defending against cyber threats.

LevelBlue Momentum Continues with Two Acquisitions

In late May, I wrote a blog post titled “One Year of LevelBlue: Milestones, Momentum, and a Vision for the Future.” Year one for LevelBlue was definitely a time of growth, change, and excitement! Today, I am writing to highlight LevelBlue’s continued momentum in the market through two recently announced acquisitions. On June 11, LevelBlue announced its acquisition of Aon’s Cybersecurity and IP Litigation Consulting groups, Stroz Friedberg and Elysium Digital.

Data is the key to building modern AI workflows

In this guest post, Eric Newcomer, Principal Analyst at Intellyx, explains why data is essential for building and running effective AI workflows. In the current phase of AI transformation, everyone is discovering many applications for gen AI, especially chats with LLM trained data, public as well as private. One interesting application of AI is building modern workflows to automate operational processes.

Unified Threat Management (UTM): The Complete Guide to Modern Cybersecurity Solutions

Key takeaways Cyber threats today are anything but simple. With attackers using every trick in the book — and inventing new ones all the time — businesses need more than a one-size-fits-all approach to cybersecurity. You require diverse cybersecurity solutions to face a variety of threat vectors. These threats are diverse, evolving, and target multiple layers of your IT environment.