Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

T-Mobile Customers Lose Extensive Information to Second Data Breach of 2023

T-Mobile is a telecommunications brand used throughout the United States, Poland, the Czech Republic, and Germany. The company provides text messaging services, voice communication, mobile data, and more for millions of customers. T-Mobile has been in business since 1999 and is well-known as a leading communications brand in the United States, and now we're learning the company isn't secure.

The Top Cyber Attacks of April 2023

In the past decade, cybersecurity has evolved from something of a niche technical field into a crucial part of every business plan and online code of conduct. Even so, we still see frequent evidence that many organizations are in need of more education about how to respond to a cyber attack. That was evident this April, as we saw the results of several high-profile cyber attacks that may have been worsened by a slow or poorly considered reaction.

Run Faster, Runtime Followers

Recently, there has been a flurry of announcements claiming to have what we call Runtime Insights, the ability to prioritize vulnerabilities. Here are two examples: I can confirm that this approach works, and it works very well. It substantially decreases the number of vulnerabilities that a team has to manage, sometimes by a factor of 100 or more! How do I know it? Because Sysdig invented this approach.

The Devo Platform: An Integrated SaaS SIEM | SOAR | UEBA | AI Solution

People or AI? YES. Is your organization equipped to handle today's and tomorrow’s threats with your existing security team or with artificial intelligence? The answer is YES. Yes, to both of them. Yes, to all of it. Whether it’s dealing with the constantly evolving threatscape or the shortage of affordable, available cyber professionals, leadership needs to fill the gap with people and AI. It’s not either/or.