Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

PKI Management: Role of Certificate in PKI, Components, PKI Lifecycle Management

Everyday life depends on the internet, from online banking to shopping online in this digital world. However, with the increase in the use of networking, cyber-crimes have also increased, which results in the stealing of sensitive data and the spreading of malicious software through unnatural links. Here comes the importance of Public Key infrastructure. PKI is based on data encryption which secures online data from cyber-attacks.

A Partnership Protecting Critical Infrastructure: Centripetal and Dynics

Threat activity today is incredibly high, and industrial infrastructure is a primary target. Centripetal and Dynics are partnering to combine IT and OT expertise to better protect critical infrastructure and industrial control systems across the United States.
Featured Post

Proactive Threat Hunting Bears Fruit: Falcon OverWatch Detects Novel IceApple Post-Exploitation Framework

The CrowdStrike Falcon OverWatch™ proactive threat hunting team has uncovered a sophisticated .NET-based post-exploitation framework, dubbed IceApple. Since OverWatch's first detection in late 2021, the framework has been observed in multiple victim environments in geographically distinct locations, with intrusions spanning the technology, academic and government sectors.

A Quick Guide To Information Security Programs

Broadly speaking, an information security program is a set of activities and initiatives that support a company’s information technology while protecting the security of business data and enabling the company to accomplish its business objectives. An information security program safeguards the proprietary information of the business and its customers. The Gramm-Leach-Bliley Act (GLBA) has a more specific definition of what a security information program should entail.

Spotting Log4j traffic in Kubernetes environments

Editor’s note: This is the latest in a series of posts we have planned over the next several weeks where we explore topics such as network monitoring in Kubernetes, using sidecars to sniff and tunnel traffic, show a real-world example of detecting malicious traffic between containers, and more! Please subscribe to the blog, or come back for more each week.