Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Ekran System Announces Integration with Venn to Enhance Remote Work Security

Ekran System announces its partnership with Venn, a provider of innovative solutions that secure remote work on any unmanaged or BYOD computer. Like Ekran System, Venn is recognized by many cybersecurity experts. It has also been named a Sample Vendor by Gartner. We hope this strategic partnership will mark a significant advancement in fortifying remote work environments against emerging cybersecurity threats.

Three Recent Examples of Why You Need to Know How Vulnerable Your Secrets Are

In today's digital landscape, the issue of compromised credentials has become a major concern. Discover how renowned companies like Microsoft, VMware, and Sourcegraph were recently confronted with the threats of secrets sprawling.

Black Hat NOC USA 2023: A tale of sharp needles in a stack of dull needles

During Black Hat 2023 in Las Vegas, our Corelight team worked effectively and speedily with our first-rate Black Hat NOC partners Arista, Cisco, Lumen, NetWitness and Palo Alto Networks. I was fortunate enough to be a member of the NOC team at the show, helping to defend the Black Hat network. In this blog, I’ll share my experience within the Network Operations Center (NOC) as well as an incident that we detected, investigated, triaged, and closed using Corelight’s Open NDR Platform.

Cloud Threats Memo: Mitigating the Risk of Third-party Apps

The use of third-party apps (also known as “connected apps”, “cloud to cloud apps”, “OAuth apps”) are apps developed by external and internal developers or organizations that can interact with and extend the functionality of a primary SaaS App. These are growing exponentially across organizations.

Exploring the ePrivacy Directive

There are a variety of cybersecurity regulations in Europe, including the ePrivacy Directive, which focuses on enhancing data protection, processing personal data, and privacy in the digital age. This Directive, recently updated with the ePrivacy regulation, continues the European Union’s ongoing efforts to create cohesive and comprehensive European data protection and cybersecurity standards across all member states.

Weekly Cybersecurity Recap September 15

This week, data breaches were particularly bad, with attacks impacting travel technology giant Sabre, production giant Johnson and Johnson, and medical company Amerita. The online service marketplace called Freecycle was also impacted and so was Traderie, a game trading platform. Millions of individuals lost their information between these various breaches. Get more details about each of the specific attacks below.

Travel Technology Company Sabre Suffers a Vast Data Breach

Sabre is a huge technology company that serves as a powerful travel reservation system for many of the major hotels and airlines in the United States. The company handles huge volumes of data during its daily duties and is responsible for maintaining accurate booking data for all these different travel companies. Sabre was recently the victim of a data breach, putting all that data at risk potentially.

Can You Get Hacked Just By Opening an Email?

No, you cannot get hacked just by opening an email. The only way you can get hacked through an email is by interacting with the contents of the email, such as clicking on a malicious link or attachment. Continue reading to learn more about malicious emails and how to avoid getting hacked through them.

Revolutionizing continuous governance

In an era where data security and access management are crucial, organizations are constantly on the lookout for modern ways to enhance their governance strategies. What if you could not only manage user identities and access rights but also extend this governance to protect privileged access, applications, cloud infrastructure and data? What if there was a comprehensive identity governance framework that could integrate and manage all your systems seamlessly?

Invest in PAM to reduce your Cyber Insurance premiums

Cyber insurance has become a key component of risk management for many organizations. However, it can be difficult to keep up with cyber insurance requirements and avoid high premiums. One of the best ways to secure better cyber insurance coverage and premiums is by implementing a solid Privileged Access Management (PAM) solution.