Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Featured Post

Partnering to Overcome the Skills Gap in Cloud Computing

For organisations that are always trying to leverage the latest technology to gain an edge over their competitors, utilising public cloud computing is at the top of the list for most decision makers. The scalability and cost-effectiveness, along with businesses not needing to invest in traditional infrastructure and having it managed by a third party, offers a myriad benefits for companies in all industries.

Security Bulletin: Arbitrary Command Execution in Kibana

On Wednesday, March 5th, Kibana disclosed a security vulnerability with a Critical CVSS score of 9.9 impacting versions 8.15.0 through 8.17.2, with 8.17.3 being patched to fully remediate the vulnerability. The vulnerability, known as prototype pollution, revolves around the malicious crafting of file uploads and the sending HTTP requests leading to arbitrary code execution on the host machine.

Stripe OLT Joins Microsoft FastTrack Program

It’s undeniable that cyber threats are becoming more sophisticated, and SMEs are facing increasing risks. Ransomware attacks, data breaches, and supply chain vulnerabilities are all on the rise, with smaller businesses being hit hardest due to limited security resources and technical expertise. At Stripe OLT, we don’t just recognise these challenges – we’re here to help you tackle them.

The Hyperdrive for Your Data

Whether it needed to outrun Imperial fighters or make the Kessel Run in less than 12 parsecs, the Millennium Falcon simply couldn’t work its magic without a functioning hyperdrive. Similarly, today’s business enterprises need a way to move vast amounts of data quickly, securely, and without interruption—but relying on the public internet simply isn’t cutting it. Data is one of the most valuable resources a business can have.

Guide: What is the CMMC-AB (Accreditation Body)?

Every year that goes by shows an improvement in technology, often by leaps and bounds over previous technology. What used to be the realm of far-off science fiction so unbelievably exotic that it defined genres is now a commonplace reality. With new technology comes new threats. We’ve seen a dramatic increase in digital threats, from the SolarWinds supply line attack, to the compromised Outlook services, to the currently-ongoing Salt Typhoon attack on telecom companies.

#196 - Security challenges in the Arctic with Deepak Dutt, Founder of Zighra

On this episode of The Cybersecurity Defenders Podcast, we talk about security issues in the Arctic with Deepak Dutt, Founder of Zighra. Deepak is a technology leader and entrepreneur on a mission to secure the future against AI-powered threats and to inspire founders to transform their ideas from zero to meaningful impact. Deepak’s career began in the software space, inspired by his father’s passion for technology. In his late teens, he founded his first company in the eLearning space, which he successfully led to an acquisition, relocating to Ottawa at the age of 21.

LimaCharlie Playbooks demo

LimaCharlie Playbooks expand the use of Python in the SecOps Cloud Platform (SCP), letting users reduce the learning curve for leveraging advanced capabilities in our platform. While the current format of our detection and response rules remain highly effective, our playbooks make much of the same functionality available to Python scripts. Playbooks also give users extreme control and granular functionality over certain operations that LCQL does not.

AI Governance in AppSec: The More Things Change, The More They Stay the Same

Every hype cycle brings fresh security concerns, and AI is no exception. AI governance might sound like uncharted territory, but it’s really just another evolution of the same security principles AppSec teams have been applying for years. The fundamentals—secure coding, risk management, compliance, and policy enforcement—haven’t changed.

The founder's guide to accelerating growth with compliance

For founders of early-stage startups, growth is the North Star. You’re focused on building a great product, winning customers, and scaling fast. Security compliance? It’s probably not on your radar—but it should be. ‍ The reality is, compliance isn’t just a nice to have or a box to check when a customer asks to see a SOC 2 report. It’s a revenue accelerator.

Why Organisations Still Fall Victim to Phishing and How to Avoid It

Phishing remains a significant threat to organisations, despite advancements in cybersecurity. The tactics used in phishing attacks have evolved significantly. Attackers now use advanced techniques like spear phishing, targeting specific individuals or roles within an organisation, and clone phishing, which duplicates legitimate messages but includes malicious links.