Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

5 ways a Human Risk Management Platform could support SaaS Security Posture Management

Software as a Service (SaaS) applications have become indispensable for organisations in today's digital landscape. From collaboration tools enabling better communication, to SaaS applications that streamline operations, enhance productivity, and support remote work. However, their convenience comes with significant security challenges—many of which stem from human errors, insider threats, and inadequate configuration practices.

AI chat resets your view of business process automation

In this guest post, Eric Newcomer, Principal Analyst at Intellyx explores the practical applications and limitations of generative AI. Generative AI is a game-changing technology. Chat bots seem like magic compared to a traditional static web search. You submit questions in natural human language and receive back complete sentences and paragraphs. But it isn’t always clear what it is really good for, given limitations such as hallucinations and inaccurate answers, and possible bias.

Unleash SaaS Performance with Netskope One Cloud Gateways & NewEdge

No matter what industry you’re in, solving for performance issues is always at the top of every networker’s mind. Especially with applications like Microsoft Teams, or similar unified communications as a service (UCaaS) solutions from Zoom, Webex, RingCentral, Mitel, Vonage, or 8×8, that have become critical to day-to-day business operations.

CIS Control 07: Continuous Vulnerability Management

When it comes to cybersecurity, vulnerability management is one of the older technologies that still play a critical role in securing our assets. It is often overlooked, disregarded, or considered only for checkbox compliance needs, but a proper vulnerability management program can play a critical role in avoiding a series of data breaches. CIS Control 07 provides the minimum requirements and table stakes, if you will, for establishing a successful vulnerability management program.

Tripwire Enterprise Integration Framework (TEIF) Is Thriving. Here's How You Can Benefit

In a team environment, it’s all about playing nice with others. The same could be said of your technology team (or stack), and its various components. The problem of disparate, complex systems – each coming from disparate, complex places – all being thrown together in an enterprise has been one the industry has been mulling over for some time.

Cyber Threats Rising: US Critical Infrastructure Under Increasing Attack in 2025

As we enter 2025, the frequency and sophistication of cyberattacks on critical national infrastructure (CNI) in the US are rising at an alarming rate. These attacks target the foundational systems that support everything from energy and water to transportation and communications, and the consequences are far-reaching and potentially catastrophic. They impact not just the operations of these services but also the very way of life for affected populations.

Recruitment Phishing Scam Imitates CrowdStrike Hiring Process

On January 7, 2025, CrowdStrike identified a phishing campaign exploiting its recruitment branding to deliver malware disguised as an "employee CRM application." The attack begins with a phishing email impersonating CrowdStrike recruitment, directing recipients to a malicious website. Victims are prompted to download and run a fake application, which serves as a downloader for the cryptominer XMRig.

CrowdStrike Strengthens Container Security with Registry Scanning for Hybrid Clouds

Organizations of all sizes require security tools to meet their complex hybrid cloud needs. As their cloud environments and workloads evolve, this includes solutions that can scan for vulnerabilities in container images regardless of their location across public and private cloud environments. The problem is, most organizations lack this capability. Many use tools that don’t allow the flexibility to move quickly and scan their full breadth of cloud assets.