Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Hello CISO - Episode 4: Employee Surveillance vs. Enterprise Security

How do you balance data collection at work with workers’ inalienable right to privacy? It's a fine line to walk, but if you always err on the side of employee privacy, it's hard to go wrong. In this episode of Hello CISO, Troy breaks down how to systematize that balance – and how to uncover the hidden costs of data collection. Hello CISO is a new series aimed at Chief Information Security Officers, IT security teams, and all other members of an organization responsible for maintaining the safety and integrity of the business and its operations.

Announcing Snyk free security for open source projects

Snyk announces expanded free offerings for open source project maintainers including unlimited scans across our platform and additional features. Snyk helps software-driven businesses develop fast and stay secure. Continuously find and fix vulnerabilities for npm, Maven, NuGet, RubyGems, PyPI and more.

A Simple Guide to Getting CVEs Published

We were once newcomers to the security research field and one of the most annoying problems we ran across was how to get a CVE published. After all, what good is it to find a juicy vulnerability if you can’t get the word out to others? So, as a resource to help our fellow researchers, we decided to put together a CVE publishing guide based on our experience, and honestly a lot of good old trial and error.

Falcon OverWatch Threat Hunting Uncovers Ongoing NIGHT SPIDER Zloader Campaign

Over recent months, the CrowdStrike Falcon OverWatch™ team has tracked an ongoing, widespread intrusion campaign leveraging bundled.msi installers to trick victims into downloading malicious payloads alongside legitimate software. These payloads and scripts were used to perform reconnaissance and ultimately download and execute NIGHT SPIDER’s Zloader trojan, as detailed in CrowdStrike Falcon X™ Premium reporting.

46 days vs. 16 minutes: Detecting emerging threats and reducing dwell time with machine learning

Machine learning (ML) detections are a powerful tool for detecting emerging threats when we don’t yet know what we’re looking for. The power of anomaly detection is the ability to detect and provide early warning on new threat activity for which rules, indicators, or signatures are not yet available.

Understanding the business value of a virtual CISO

Cyber attacks are an ever–present threat and hackers continue to develop more sophisticated ways to gain access to business data. Organisations host a vast amount of sensitive information online that can be exploited by cybercriminals if left unprotected. With the way business is conducted, including an increase in remote workers and migration to the cloud, businesses need to implement strong security controls to bolster their cyber posture and secure their data.

Ivan Tsarynny and Vitaliy Lim on Feroot's $11 Million Seed Funding to Improve Client-Side Security

Brilliant business ideas are driven by brilliant entrepreneurs. Enter Feroot’s own Ivan Tsarynny, CEO and Vitaly Lim, CTO, whose vision to improve client-side or “front-end” security for businesses around the globe resulted in the closing of $11 million in seed funding led by True Ventures. Feroot will use the funds to meet growing demand for client-side security solutions by accelerating product development and go-to-market initiatives.