Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security Obscurity: DNS Tunnelling and CensysGPT

Join Bill Carter and Robin Johns as they talk about the latest and greatest Cybersecurity topics and incidents happening across our digital landscape. In this episode we dive into the concepts and attack vectors of DNS Tunnelling, as well as start exploring the dangerous OSINT tools of Shodan and Censys. Security through obscurity used to be acceptable, but with GPTs and Adversarial GANs appearing - is this still a valid approach?

Security Competency and More - Deepening our Ties with AWS

Since a lot of our customers build and run their applications in AWS, our partnership and joint solution delivery with AWS provides enormous value. We’re excited to share that we’ve deepened our ties to AWS in two compelling ways, by achieving AWS WAF Ready Status and earning AWS Security Competency. Salt is the first and only API security company in both of these vital AWS programs.

API Security: Understanding Types, Challenges, and Best Practices

The digital world has brought advancements in all sorts of life. The applications communicate with each other over the internet to deliver effective service. API is an application language that interacts with the application server to extract the client’s intended information and produce it readable. It is estimated that the global API market will reach about 13.7 billion US dollars by 2027. This user-friendly software makes the business organization widely adopt it to enhance their growth.

Amazon Security Lake & ChaosSearch deliver security analytics with industry-leading cost & unlimited retention

Amazon Security Lake is a new service from Amazon Web Services (AWS) that is designed to help organizations improve their security posture by automating the collection, normalization, and consolidation of security-related log and event data from integrated AWS services and third-party services (Source Partners). By centralizing all the security data in a single location, organizations can gain greater visibility and identify potential threats more quickly.

Centripetal Expands Innovative CleanINTERNET® Technology to the Cloud

Centripetal announces the launch of CleanINTERNET® CLOUD extending protection to enterprise assets anywhere - whether on premises, remote or in the cloud. CleanINTERNET® is a revolutionary approach to defending organizations from cyber threats.

Elastic and AWS - Securing the cloud, together

Elastic is pleased to announce that we have recently achieved the AWS Security Independent Software Vendor (ISV) Competency Partner status with specialization in Threat and Detection Response (SIEM, SOAR, and XDR). This recognition highlights our commitment to providing you, our customers, with advanced security capabilities that can help you protect your sensitive data and applications in the cloud.

Harnessing Intelligence Powered Cybersecurity in the Cloud

As businesses increasingly embrace cloud computing to enhance their operations, the need for robust cybersecurity measures becomes paramount. Traditional cybersecurity approaches often fall short in protecting cloud environments against ever-evolving cyber threats. This is why today we are excited to announce that we are expanding our CleanINTERNET® service to the cloud.

Introducing Charlotte AI, CrowdStrike's Generative AI Security Analyst: Ushering in the Future of AI-Powered Cybersecurity

CrowdStrike has pioneered the use of artificial intelligence (AI) since we first introduced AI-powered protection to replace signature-based antivirus over 10 years ago, and we’ve continued to deeply integrate it across our platform since. We combine the best in technology with the best of human expertise to protect customers and stop breaches.

Introduction to the purpose of AWS Transit Gateway

Today you look at the Global/Multi-site Enterprise Security Architecture of an organization and see a myriad of concerns. Increased levels of complexity, difficulties managing multiple third parties, difficulties implementing consistent levels of security, and so on. This makes it imperative for organizations to identify opportunities to simplify, streamline, and generally improve their infrastructure wherever possible. Managing the level of complexity is becoming increasingly difficult.