Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The end of muckwork

Muckwork is the invisible drag on every company. It’s the repetitive, manual, low-leverage work we tolerate because we assume it’s necessary. Copying data between systems. Triaging alerts. Clicking through approvals. Tasks that keep things running but slow everything down. In 2006, Jeff Bezos called the backend plumbing of web apps “muck.” AWS was created to eliminate it. Today, the same kind of work is everywhere in the enterprise. We call it muckwork.

Asset Discovery: A Starting Point, Not a Security Strategy

One of the foundational security practitioners’ mantra “you can’t protect what you can’t see” has become a security gospel. As enterprises expanded from hundreds of physical assets to thousands of devices including ephemeral workloads, a troubling reality has emerged: visibility alone does not equal security. In this article.

New Bill Mandates Cybersecurity Overhaul for Federal Contractors

New cybersecurity legislation is coming thick and fast. And for good reason: cyber threats are becoming more sophisticated, systems are becoming more connected, and geopolitical relationships are becoming more fraught. One of the most recent bipartisan legislations – the US Federal Contractor Cybersecurity Vulnerability Reduction Act of 2025 – is designed to modernize cybersecurity standards in the US and protect the country from threats.

Introducing Graylog 6.2: A SIEM Without Compromise

What does it really mean to have a SIEM Without Compromise? For too long, security teams have been stuck in a no-win game—forced to choose between visibility and cost, detection breadth and team capacity, automation, and control. Every decision felt like a trade-off, with real-world consequences: dropped logs, missed alerts, and inconsistent response when it mattered most. With the Spring ’25 release of Graylog Security 6.2, we’re eliminating those compromises.

2025 Cyber Resilience Research Discovers Speed of AI Advancing Emerging Attack Types

It is no secret that AI is advancing at a blistering pace for everyone – including cyber adversaries. The mainstream unveiling of generative AI in 2024 brought about the biggest disruption in computing since the microprocessor. AI solutions promise the world unprecedented levels of efficiency, speed, and automation. However, this seemingly utopian and disruptive technology is evolving more quickly than governance and regulations can keep pace and implement guard rails for use and adoption.

Fireblocks Enables Web3 Connectivity for Calastone's Industry-First Tokenised Fund Distribution Platform

Fireblocks is now working with Calastone, the largest global funds network, to support Web3 connectivity within Calastone’s Tokenised Distribution solution, a first-of-its-kind solution enabling asset managers to tokenise any fund on Calastone’s network and distribute it across blockchains such as Ethereum and Polygon. Fireblocks is providing secure infrastructure components that enable integration with Web3-native distributors.

How to Start a Career as a Cybersecurity Analyst Without Experience

The demand for cybersecurity analysts has skyrocketed in recent years, driven by the increasing need for organizations to protect sensitive data and prevent cyber threats. Many aspiring professionals wonder how to become a cyber security analyst when they don't have prior experience in the field. The good news is that while cybersecurity can seem like a complex and intimidating career path, there are clear, achievable steps you can take to break into the industry - even if you're starting from scratch.

Targeted by 20.5 million DDoS attacks, up 358% year-over-year: Cloudflare's 2025 Q1 DDoS Threat Report

Welcome to the 21st edition of the Cloudflare DDoS Threat Report. Published quarterly, this report offers a comprehensive analysis of the evolving threat landscape of Distributed Denial of Service (DDoS) attacks based on data from the Cloudflare network. In this edition, we focus on the first quarter of 2025.

The API Imperative: Securing Agentic AI and Beyond

We recently released The Rise of Agentic AI, our API ThreatStats report for Q1 2025, finding that evolving API threats are fueled by the rise of agentic AI systems, growing complexity in cloud-native infrastructure, and a surge in software supply chain risks, and uncovered patterns and actionable insights to help organizations prioritize risks and harden their defenses. Keep reading to find out more.

Is It Possible to Erase Yourself from the Internet?

Our digital footprint, the trail of data and information left behind while using the internet, can be overwhelming. It encompasses everything from our social media posts and the websites we have visited to the emails we’ve sent and the online searches we have conducted. With all this information floating around, consumers have a legitimate interest in controlling that flow of information.