Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

Synthetic Identity: When AI and ML Crunch (Your) Harvested Data

ChatGPT knows a lot about Len Noe, CyberArk’s resident technical evangelist, white hat hacker and biohacker. The biohacker piece of his title is a nod to the fact that Noe is transhuman (you might call him a cyborg and be right), which is why his grandkids call him “Robo Papa.” ChatGPT knows all of this.

IONIX Wins Two 2023 Silver Globee Awards

IONIX has won two prestigious 2023 Globee® Awards, which include a Silver in the 3rd Annual Globee® Information Technology (IT) Awards for Best Attack Surface Management Product and a Silver in the 3rd Annual Globee® Disruptor Award for Cyber Security Software. These awards come on the heels of a Gold 2023 Globee® Cybersecurity Award for Best Security Software.

ChatGPT, the new rubber duck

Whether you are new to the world of IT or an experienced developer, you may have heard of the debugging concept of the 'programmer's rubber duck’. For the uninitiated, the basic concept is that by speaking to an inanimate object (e.g., a rubber duck) and explaining one’s code or the problem you are facing as if you were teaching it, you can solve whatever roadblock you’ve hit.

Underwriting Cyber Risk Part 1: Focus on Cyber Hygiene

Cyber risk uncertainty is growing. Despite massive spending worldwide to the tune of $173 billion, cyber attacks keep occurring. Ransomware attacks—a type of cyberattack that encrypts an organization's network or locks users out of their devices and requires a ransom before restoring access—are costing companies 20 days of downtime on average. Within the next few years, nearly half of companies worldwide will experience cyber attacks on their software supply chains.

Audit and Compliance with Calico

In this blog post, I will be talking about audit and compliance and how to implement it with Calico. Most IT organizations are asked to meet some standard of compliance, whether internal or industry-specific. However organizations are not always provided with the guidance to implement it. Furthermore, when guidance has been provided, it is usually applicable to a more traditional and static environment and doesn’t address the dynamic nature of Kubernetes.

8 Cyber Hygiene Habits to Keep You Safe Online

We are all familiar with the importance of hygiene in our day-to-day lives so as not to get sick or spread germs to others; this same concept can also ring true in our digital lives by applying cyber hygiene habits to keep our privacy and security safe online. It is important to familiarize ourselves with these procedures to avoid common cybersecurity mistakes that can be detrimental to your online privacy, such as loss of files, corrupted data, or identity theft.

Falcon Insight for ChromeOS: The Industry's First Native XDR Offering for ChromeOS

In recent years, ChromeOS device usage among businesses has seen a significant uptick, particularly in its adoption across verticals, from schools to large enterprises. According to recent IDC research, 16% of North American organizations have ChromeOS devices1 and the percentage is only expected to increase. The success of ChromeOS devices like Chromebooks can be attributed to built-in security, simple management and premium performance.

Uncover the CVE shocking truth - image vulnerabilities exposed and prioritized

Scanning containers’ images is not enough, pinpointing the CVEs that impact your security posture is key. Public images are a key component of the cloud-native ecosystem. Also known as container images, they are pre-built and publicly available software packages that contain all the necessary dependencies and configurations for an application to run in a containerized environment.

5 Telltale Signs You're Running a Cloud-Hosted - Not a Cloud-Native - SIEM

The necessity of a SIEM for organizations and their security teams has evolved dramatically over time. It has gone from edge use cases and compliance to the current preferred form of threat detection, hunting, and incident response. As the use cases have changed, so has the architecture. As a result, organizations that have been running their SIEM on-premises are now looking for modern architectures to reduce the workload on their analysts. The simple choice: SaaS, of course.