Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

How Sysdig is Using the ThreatQ Platform to Enhance Cloud Threat Detection and Response

It is always interesting to learn about real-world examples of technologies at work. So, when ThreatQuotient invited me to share how we at Sysdig are using the ThreatQ Platform to enhance our cloud detection and response solutions, I was happy to participate.

2022 Elastic Global Threat Report: Helping security leaders navigate today's threat landscape

Staying up-to-date on the current state of security and understanding the implications of today’s growing threat landscape is critical to my role as CISO at Elastic. Part of this includes closely following the latest security threat reports, highlighting trends, and offering valuable insights into methods bad actors use to compromise environments.

This ain't' no Ordinary Product Release!

It’s breakthrough and game-changing for Biden’s SBOM and customers’ IoT Edge security and deployment challenges. This week the Device Authority team is proud to be releasing KeyScaler 7.0. This has been a seismic achievement, adding breakthrough features based on customer demand, as we advance our Product Led Growth Strategy to solve the Zero Trust for IoT security challenges. Device Authority’s breakthrough KeyScaler 7.0 release includes advanced Edge and SBOM capabilities.

5 best practices for building modern access control for cloud applications

Recently, I met with Or Weis — a Snyk Ambassador — to discuss access control in the cloud. Or is an entrepreneur, based in Tel Aviv, where he founded Permit.io, a solution that empowers developers to bake in permissions and access control into any product in minutes and takes away the pain of constantly rebuilding them.

Fostering an effective and secure remote-work model

An IDSA study found that 79% of enterprises have suffered an identity-related breach. At ManageEngine, we understand how important identities are to the overall security posture of an organization. That’s why this Identity Security Week, we’re offering a series of blogs to spread awareness about the importance of identity security and what simple measures can help improve the security of your organization. Let’s kick off the series with a trending topic—remote work.

Axis Awarded CRN's Prestigious 2022 Tech Innovator Award for its Security Service Edge Platform, Atmos

Axis has announced that CRN®, a brand of The Channel Company, has chosen the company as a winner for the 2022 CRN Tech Innovator Awards. Axis is being recognized for its Security Service Edge (SSE) platform, Atmos.

Network Security 101: A Brief Intro to Securing Networks

We live in a world of rapid technological advancements. Technologies such as big data, the internet of things (IoT) and artificial intelligence have created a world full of opportunities and solutions. However, it has also opened doors to increased threats, cyberattacks and network vulnerabilities. This post will explain network security, including relevant concepts and issues, as well as best practices that can your organizations secure all your networks and surfaces.

7 Steps to Identifying and Fighting Cyber Crime for your Business

Cybersecurity is at the forefront as technology sees increasing adoption across multiple industry verticals. Organizations must prevent and fight cyber crime, but it can take over 200 days to detect a breach for many. This time frame increases the possible consequences of the breach and gives cybercriminals an opportunity to move laterally to other systems and exfiltrate the information they need. Once stolen, they may sell it to other cybercriminals who can use it for more nefarious means.