Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CISOs Stop Struggling! Trustwave Security Colony - Your All-in-One Cybersecurity Arsenal

Few repositories of cybersecurity knowledge are as broad, deep, and widely respected as Trustwave Security Colony. The industry analyst firm IDC has praised Security Colony, which sees clients and others interested in learning more about their cybersecurity posture download thousands of resources every month, much of which is available for free. IDC deemed this information so important that, in a recent report, it named Security Colony a "differentiator" from others in the field.

Creating an Incident Response Process

In today’s cyber threat landscape, almost everyone is one bad day away from a security incident. While not every incident becomes a data breach, security teams need to be prepared for anything. Just like that one friend who has a spreadsheet to help them organize the minute tasks associated with a project, security teams need to have a prepared list of steps to take during an incident.

Network Digital Twin Technology identified as Transformational in Hype Cycle for Enterprise Networking, 2024

It seems as if there is a new networking technology announced every day. When faced with a deluge of information and vendors seeking your attention, it’s easy to get overwhelmed. We feel the Gartner Hype Cycle reports seek to tame the confusion by objectively reviewing new technologies and applications and offering IT leaders a view of how new additions to the market will evolve over time.

Password Hygiene Tips and Best Practices

Password hygiene tips to follow include using unique passwords, enabling Multi-Factor Authentication (MFA) and keeping your passwords safe in a password manager. Password hygiene encapsulates the best practices for protecting your passwords and online accounts. When you practice good password hygiene, your strong passwords will prevent you from becoming a victim of cyber attacks, virus and malware infections, password breaches and more.

Threat Actor Distributes Python-Based Information Stealer Using a Fake Falcon Sensor Update Lure

On July 23, 2024, CrowdStrike Intelligence identified a malicious ZIP file containing a Python-based information stealer now tracked as Connecio. A threat actor distributed this file days after the July 19, 2024, single content update for CrowdStrike’s Falcon sensor — which impacted Windows operating systems — was identified and a fix was deployed. The ZIP file uses the filename CrowdStrike Falcon.zip in an attempt to masquerade as a Falcon update.

Olympic Games Special: How to protect cybersecurity of sports organizations

Millions of spectators from around the world will flock to Paris this summer to attend the 2024 Olympic Games. The UEFA European Football Championship and the America's Cup are also taking place this summer, giving us weeks of massive sporting events on both sides of the Atlantic.

Global IT Outage: CrowdStrike Falcon Sensor Update Mishap and Resulting Cyber Threats

On July 19, 2024, a botched CrowdStrike Falcon sensor update for Windows operating systems led to the largest IT outage in recent history. Although the issue stemmed from a technical malfunction, it inadvertently opened the door for real threat actors to exploit the situation. This incident has triggered a wave of malicious activities, particularly targeting CrowdStrike’s Latin American (LATAM) customers.

Migrating from legacy SOAR platform to Tines: a step-by-step guide

In this blog post, Martin Moroney, Customer Success Engineering Manager at Tines shares lessons on migrating from a legacy SOAR platform, based on his experience in overseeing dozens of successful migrations. Enterprise system migrations are complex projects, with intimidating challenges that require meticulous planning and execution. This complexity is amplified in the context of systems that leverage many integrations to support complex workflows.