Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Migration Made Easy Using Trustwave's Microsoft Security Migration Program

The need to purchase, install, and optimize cybersecurity technology is not up for debate. No organization is immune to the possibility of a cyberattack, which means each must be prepared to defend themselves to reduce the likelihood of a successful attack. While organizations start out with the goal of keeping their tech stack simple, cost-effective, and productive, many find that over time, the technology they have acquired has the polar-opposite impact.

Ep 8: Living Off The Land

Cyber experts start getting called into electric, water, pipeline, railway, and transportation hubs around the country. Hackers have found a clever way to embed in these systems, using a small, unsuspecting device in everyday Americans’ homes. And once these hackers get in, they’re not dropping the usual malware, or sucking much of any data out. Unlike their predecessors, these hackers are very careful to cover their tracks. It appears they’re just lying in wait. Sleeper cells waiting for marching orders. So what’s the trigger? And what happens if they pull it?

The Rise of Vulnerability Exploits: Why Hackers Are Moving Beyond Phishing

The 2025 edition of Verizon’s Data Breach Investigations Report (DBIR) shows a new reality: about one in five confirmed breaches now starts with exploitation of a software vulnerability, a 34 percent jump over the previous year and the first time the vector has surpassed phishing.

Getting Started with 11:11 Cyber Vault for Cohesity

Leveraging this solution should help you optimize the cost of your overall Cohesity solution and adhere with a 3-2-1-1-0 protection strategy. This is part of the wider release of Cyber Vault products from 11:11 with versions for Veeam and Zerto coming shortly. We’ve been focusing on the deployment of the base Cohesity capability, Cloud Archive v2, lately.

Walking a Tightrope: Creating Effective Password Policies in Your Organization

Tightrope walking, or funambulism, is a mesmerizing blend of skill, balance, and focus. Performers traverse a thin, elevated rope, using tools like balance poles to stabilize and counter gravity. It demands precise movements, mental composure, and confidence to overcome fear. Rooted in ancient traditions, it remains a captivating symbol of risk and control.

EP 6 - Incident Response POV: 2025 Emerging Threats

In this episode of Security Matters, host David Puner, dives into the world of evolving cyberthreats with Bryan Murphy, Senior Director of CyberArk's Incident Response Team. Imagine a scenario where an attacker uses AI-generated deepfakes to impersonate your company's VP of finance, gaining unauthorized access to your environment. Bryan Murphy shares insights on how these sophisticated attacks are turning identity into the attack surface and why your first line of defense might be as simple as a video call.

Learn About Open Source Security Risks With the New Snyk Learn Learning Path

Snyk Learn, our developer security education platform, now includes lessons on risks in open source software! Check out the new learning path that covers the OWASP Top 10 risks for open source software. Open source software forms the backbone of today’s digital infrastructure. From libraries and frameworks to entire platforms, open source is everywhere. But as a famous uncle once said, with great power comes great responsibility!

Dynamic Application Security Testing: DAST Basics

DAST is a security tool that attempts to penetrate an application from the outside by checking its exposed interfaces for vulnerabilities and flaws. Sometimes called a web application vulnerability scanner, it is a type of black-box security test. It looks for security vulnerabilities by simulating external attacks on an application while the application is running.