Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What can you do with an enriched SBOM? A parlay quickstart guide

We just released parlay, a new open source tool that can enrich SBOMs with additional information. You can read more in the announcement blog post. In that post, we briefly mentioned why this is important for decision-making based on SBOM data, but thought a few quick examples might be interesting. parlay can add a lot of extra information to an SBOM, and we can use that information to write more powerful policies.

Navigating the Turbulent Waters of Cybersecurity: Nationalism, Economics & AI

Welcome to the Razorwire podcast. In this episode, I delve into the turbulent waters of cyber security with Razorwire favourite, Oliver Rochford. We'll be discussing a range of topics that are currently shaping the industry, including economic challenges, nationalism and the continuing impact of the pandemic. We'll also be exploring the use of acronyms, consolidation and rationalisation in the vendor space, and the development and potential dangers of AI. But that's not all! We'll also be taking a closer look at the weaponisation of security, the need for active security and moving target defence, and the potential for mergers and acquisitions in the industry.

Attack Surface Intelligence (ASI) Data Updates: Enhancing Threat Research Capabilities

In the ever-evolving cybersecurity landscape, staying ahead of potential threats is crucial. Attack Surface Intelligence (ASI) is vital in identifying vulnerabilities and mitigating risks. This blog post will discuss the latest data updates in ASI and the exciting developments within our threat research group.

WatchGuard Wins Two Fortress Cyber Security Awards

We’re thrilled to share that Business Intelligence Group has named WatchGuard as a winner in the Organizational Excellence category and recognized WatchGuard CEO Prakash Panjwani with a prestigious Leadership Award at this year’s Fortress Cyber Security Awards! This annual program recognizes the top companies, executives, and products from around the world leading the charge in preparing, defending and responding to growing cybersecurity threats.

Coffee Talk with SURGe: the Interview Series featuring Scott Roberts

Join Mick Baccio and special guest Scott Roberts, head of threat research at Interpres Security for an interview about Scott's career journey, how he's seen cybersecurity evolve over time, and his essay featured in the SURGe team's new book, Bluenomicon: The Network Defender’s Compendium.

Streamline Co-editing Microsoft Documents with Egnyte

As part of our ongoing commitment to providing a seamless co-editing experience to Egnyte users, we have introduced new enhancements that enable Windows and Mac users to open any Microsoft Office-supported file such as Word, Excel, and PowerPoint, and start or join a co-editing session directly from the Microsoft Office App. Users can also co-edit in real time using the Egnyte Desktop, Online or Mobile versions.

Sysdig Enriched Process Trees, an Innovative Approach to Threat Detection

Discover how Sysdig Secure’s new Process Tree feature improves threat investigation. In order to speed up the investigation of security events, Sysdig Secure now includes a process tree showing the attack journey from user to process, including process lineage, container and host information, malicious user details, and impact. In Linux systems, a process tree refers to the hierarchical representation of running processes on a system. It depicts the parent-child relationship between processes all the way to the root.

Responding Instantly to Kubernetes Threats with Sysdig Live

Discover how Sysdig Secure’s new “Kubernetes Live” informs of your Kubernetes security posture at a glance. The new Live feature allows you to evaluate and respond instantly to threats. It understands and dynamically maps the live infrastructure, workloads, and relationships between them, compared to static CSPMs or context-blind EDR products. Kubernetes Live simplifies investigation processes by offering a unified view Sysdig Secures Kubernetes related data. It aggregates information, from detection, to vulnerabilities to network access, into a single platform for easier oversight.