Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Hack the Building 2.0 Hospital - Training New Cybersecurity Talent

This year for the 13th year in a row, the healthcare industry continues to experience the most expensive data breaches worldwide, at an average cost of nearly $11 million – double the cost for the next-highest industry, finance. That’s not surprising; ransomware attacks on hospitals and health systems are constantly in the news. Add to that the cybersecurity talent shortage, which is especially acute (pardon the pun) in the healthcare industry.

Cato Protects Against Atlassian Confluence Server Exploits (CVE-2023-22515)

A new critical vulnerability has been disclosed by Atlassian in a security advisory published on October 4th 2023 in its on-premise Confluence Data Center and Server product. A privilege escalation vulnerability through which attackers may exploit a vulnerable endpoint in internet-facing Confluence instances to create unauthorized Confluence administrator accounts and gain access to the Confluence instance.

How a Major Network and Cloud Security Provider Uses SafeBreach for Security Control Validation

Between the time it takes to stand up a new security tool in an IT environment, the resources needed to continually train personnel to effectively use each tool, and the raw cost of the solution itself, enterprise security teams invest quite a lot when introducing new security controls. Solutions that have been in place for a long time have likely grown with the team’s needs, and are well trusted within the organization.

SASE Transformation: 6 Scenarios Demanding Modern SD-WAN

The following is derived from the new book, Modern SD-WAN for SASE for Dummies, Netskope Special Edition. Click here to get your complimentary copy. For decades, computer networking has powered our businesses, our communities, and our lives. As computing and the digital world have evolved, enterprise networking has struggled to keep up. Local area networks (LANs) gave way to MPLS WANs and MPLS WANs gave way to SD-WANs. Out with the old, in with the new.

WatchGuard Threat Lab Report Finds Endpoint Malware Volumes Decreasing Despite Campaigns Growing More Expansive

Key findings from the research also show a rise in double-extortion attacks, self-managed websites targeted for malware delivery, threat actors continuing to exploit older software vulnerabilities, and more.

DarkGate Loader Delivered via Microsoft Teams - How It Works, How to Mitigate It and How Forescout Can Help

The threat intelligence data that Forescout Research – Vedere Labs curates comes from the millions of connected devices that we monitor, attacks we observe and dissect in our sandboxes, data relating to attacks that is traded on the Darknet, and from our Adversary Engagement Environment. We see a lot of data. One thing no cybersecurity researcher wants to see, however, is an attack on their own organization.

Announcing General Availability for the Magic WAN Connector: the easiest way to jumpstart SASE transformation for your network

Today, we’re announcing the general availability of the Magic WAN Connector, a key component of our SASE platform, Cloudflare One. Magic WAN Connector is the glue between your existing network hardware and Cloudflare’s network — it provides a super simplified software solution that comes pre-installed on Cloudflare-certified hardware, and is entirely managed from the Cloudflare One dashboard.

Using Corelight to Identify Ransomware Blast Radius

Over the past few months, ransomware targeting healthcare organizations has been on the rise. While ransomware is nothing new, targeting healthcare organizations, at the extreme, can impact an organization’s ability to engage in anything from routine office visits to life-or-death diagnoses, treatments, and patient care.

Cloudflare vs. Azure WAF

Cloudflare WAF protects against web-based attacks and malicious traffic using customizable rule sets. Cloudflare’s network extends across numerous data centers worldwide, ensuring efficient content delivery and robust DDoS protection. Moreover, Cloudflare provides supplementary functionalities such as CDN caching, SSL/TLS encryption, and DNS management to enhance overall web performance and security.