Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

What C-Levels Should Know About Enterprise Cloud Backup

Enterprise cloud backup keeps your business running when disaster strikes. Organizations lose an average of $5,600 per minute during downtime, making reliable data protection non-negotiable for companies running applications across multiple clouds, containers, and virtual environments. Traditional backup methods fail with modern distributed infrastructure; you need enterprise backup strategies that scale with your actual environment, not outdated approaches that worked a decade ago.

Defending Against WAF, API, and DDoS Attacks

Defending Against WAF, API, and DDoS Attacks In this video from SourceForge, Carlo Alpuerto of A10 Networks explains the "outside-in" protection philosophy behind ThreatX. He uses the metaphor of a castle wall, stating that the defense focuses on who and what is attacking it, rather than what is behind it. Alpuerto details the flexibility of the A10's ThreatX solution, which can be deployed in various hybrid scenarios, including on-premise physical or virtual environments, as well as different cloud environments like AWS, Azure, and GCP.

The MemcycoFM Show: Episode 13 - How 5 of the Biggest Retail ATO Attacks Could Have Been Stopped

Retailers have become prime targets for account takeover. Loyalty balances, stored cards, and digital wallets represent liquid assets, often guarded by weaker controls than financial accounts. Attackers exploit credential reuse, phishing infrastructure, and automation to scale these intrusions. Reported retail ATO cases in the UK rose 96% year over year (Action Fraud, 2023). The following five breaches illustrate how large brands across loyalty, e-commerce, and digital wallets were compromised, and how real-time, in-session defenses could have altered the trajectory.

Can My Hacked Account Be Recovered?

Few things are as alarming as discovering that one of your accounts has been hacked. Unfortunately, the reality is that recovering a hacked account is often very difficult – sometimes impossible. Here’s why getting your account back can be unlikely, what risks are involved, and how you can protect yourself from attacks.

Introducing D-Fence: MailMarshal's Advanced Machine Learning Phishing Protection

Trustwave, A LevelBlue Company, is proud to unveil D-Fence, a powerful new machine learning-based anti-phishing layer now seamlessly integrated into MailMarshal that captures 40% more phishing emails. This capability is needed now more than ever as phishing attacks are among the top three attack vectors, according to the FBI.

Introducing Cato's API Assistant: Your New Copilot for GraphQL

Imagine you just got a new car with a feature that automatically adjusts the air conditioning based on live weather forecasts. To activate it, you need to connect the car to an external weather service. You could take it to the garage, pay someone to configure it, and wait for the job to be done. Or, you could use a built-in assistant that asks you two simple questions and shows you how to set everything up in minutes. That’s the idea behind Cato’s new API Assistant.

Cloudflare Radar Reels Ep 5 - Powering AI with Global Scale & Real-Time Insights

AI breakthroughs demand speed, scale, and visibility. From image creation to real-time text analysis, next-gen AI depends on lightning-fast networks. Cloudflare’s presence in 330+ cities makes it happen. Cloudflare's Radar Display gives you a front-row view of the trends shaping AI’s future.

Crypto Security: Best Practices to Protect Digital Assets

Learn expert security tips to protect your crypto assets easily and safely. Read more on scams, storage security, and best practices, as well as how to ensure your private key is protected. Decentralized finance (DeFi) is revolutionizing the financial world by leveraging crypto and self-custody mechanisms, allowing people to own their tokens directly without third-party intervention.