Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Ransomware Threat: Preparing Schools and Libraries for Ransomware Attacks

Ransomware attacks have emerged as a significant threat to educational institutions. Cybercriminals encrypt sensitive data and demand payment for its release, severely disrupting school operations and leading to exorbitant recovery costs for districts. With ransomware tactics continually evolving, the security of the entire U.S. education system is at risk.

Keeping Secrets Out of Logs: Building a Robust Defence Against Log Leaks

Ever found sensitive data in your logs? You're not alone - even tech giants like Google and Facebook have faced this challenge. Watch this actionable webinar on keeping secrets out of logs featuring our special guest speaker, Allan Reyes. �������� ������'���� ����������: No theoretical fluff - just practical solutions that you can start using tomorrow. Perfect for security engineers, developers, and tech leads who want to sleep better at night knowing their logs aren't accidentally exposing sensitive data.

Cato XDR: Finally, A Tool Built by People Who Actually Read the Logs!

Ever feel like some tools are designed by people who’ve never had to use them? Like those public restroom hand dryers that leave your hands wetter than before, or CAPTCHAs that make you question if you even know what a bicycle looks like—it’s like a bad joke at our expense. In the 2022 Devo SOC Performance Report, questions were raised about the biggest challenges faced by security operations center (SOC) teams.

Where the Shadows Lie

Shadow technology, regardless of name, is a manifestation of the same issue - unmonitored, unauthorized, or hidden technology operating outside official oversight. Over the past ten years, with the adoption of SaaS services, Shadow IT became a significant concern for security teams. With the more recent explosion of AI tools, we’ve started to hear the term Shadow AI being used for the same reasons.

WatchGuard Endpoint Security Excels in the 2024 Industry Awards and Reports

As businesses settle into the new year, managed service providers (MSPs) should thoroughly review and strengthen their customers' endpoint cybersecurity strategies. According to WatchGuard data, in Q3’2024, endpoint malware detections were up significantly. This is a 300% increase compared to Q2, highlighting the importance of strengthening security measures at this time of year.

What's new in Tines: February 2025 edition

Only allowing one test story at a time when change control is enabled is restricting. That’s why builders can now create multiple drafts in a story. Set changes live faster by duplicating drafts and publishing smaller edits first. And in the spirit of speed and efficiency, easily delete drafts from a story using the API. Read more on change control →

Solving Secrets Management Challenges for NHIs: GitGuardian Integration with HashiCorp Vault

Struggling with vault sprawl and NHI secrets? GitGuardian’s new HashiCorp Vault integration helps cybersecurity teams centralize secrets management, reduce blind spots, and strengthen security for today’s intricate infrastructures.