Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Why Do You Need Client-Side Security?

Client-side security is important today because of the increase in attacks against individuals using the web to access services that require the sharing of sensitive and personally identifiable information (PII). Feroot enables proactive client-side security programs to protect the customer journey. Our products are designed to significantly diminish a threat actor’s ability to breach customer data or damage websites via client-side attacks. We help cybersecurity and application security professionals guard the customer experience.

What is Double Extortion Ransomware? And How to Avoid It

As the internet grows, so does the sophistication and capabilities of cyber attacks. Cybercriminals constantly develop new ways to exploit even the most complex networks and servers. One of the newer types of attacks caused major headlines in 2020 and continues to be a force to be reckoned with for even the largest companies and organizations. It's called a double extortion ransomware attack. Becoming a victim of these vicious attacks can lead to devastating consequences.

The Role of IAM in Maintaining Cloud Security

Cloud computing is an effective solution for large and small companies across every industry. There has been rapid adoption due in large part to its accessibility, flexibility, and reliability. The cloud environment brings a significant amount of benefits, but at the same time, it can expose businesses to various alarming cybersecurity risks. A study conducted by Thales and 451 Research revealed that 40% of respondents have experienced a data breach within their cloud environments.

CVE-2022-30522 - Denial of Service (DoS) Vulnerability in Apache httpd "mod_sed" filter

This past March we posted an analysis of a vulnerability in the Apache HTTP Server mod_sed filter module, CVE-2022-23943, in which a Denial of Service (DoS) can be triggered due to a miscalculation of buffers’ sizes. While analyzing this Apache httpd vulnerability and its patch, we suspected that although the fix resolved the issue, it created a new unwanted behavior. Our suspicion turned out to be true: we discovered that another way to cause a DoS was introduced.

Breaking Down the 2022 Verizon Data Breach Investigations Report (DBIR)

Every year Verizon releases the Data Breach Investigations Report (DBIR), covering some of the biggest trends in data breaches across industries, highlighting the common causes for breaches as well as trendy attack vectors. And every year, when it is released, my inbox is immediately hit with questions from colleagues and customers asking how Netskope can mitigate each of the issues raised. So this year I thought I would share my analysis more widely.

Data Fusion: Supporting Payment Fraud Prevention Strategy with The Right Data

This blog is a part of our new series 5 Strategies for Building Resilience to Financial Crimes and Cyber Attacks in 2022. Access to the right data at the right time is the foundation of an efficient payment fraud prevention strategy. At INETCO, we like to say that not all insights are created equal: if you are missing some key pieces of the puzzle you won’t get a clear picture of the threat landscape.

Why Online Privacy Matters to All Types of Business

Online privacy is a state where one can keep their information and activities private from others. Due to the increase in internet usage for various purposes like social media, entertainment, education, and even business, the threat to data privacy has also increased. Above all the other online niches, businesses involve more critical data such as customer data, financial information, intellectual property, business agreements, and employee details.

Tigera: State of Cloud-native Security 2022 Market Report: Key Implications for Organizations

Our first 'State of Cloud-Native Security market' report compiled survey results from more than 300 security and IT professionals worldwide, and explored organizations' needs and challenges when it comes to containers and cloud-native applications, specifically in the areas of security, observability, and compliance.

Tigera: Hands-on workshop: Implementing security controls on containerized workloads on AWS, Microsoft, Red Hat or Rancher

Attend this in-depth, hands-on workshop with a Calico expert to design and implement container security, zero-trust workload security, and advanced troubleshooting for your containerized workloads. The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and is designed to provide more complete knowledge on: We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Tigera: RKE Workshop: Hands-on workshop - Implementing Zero-Trust Security for Containers

In this RKE-focused workshop, you will work with Suse Rancher and Calico expert to learn how to implement Zero-Trust security for workloads running on an RKE environment. This 90-minute hands-on lab comes with your own Calico Cloud environment. Join us to learn how to: We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.