Almost a decade ago, ransomware started becoming a prominent consumer problem, locking computers and threatening users with fines and jail time for supposedly downloading unlicensed software or child pornography. Not long after that cyber criminals swi…Read More Sophos XDR: Threat hunting through the entire security ecosystem
Digital transformation has been around for a while, but last year it accelerated its pace significantly. As organizations suddenly shifted to an almost exclusively digital world, the need to protect digital assets grew even more. One way to tackle thes…Read More How do I select a managed cybersecurity solution for my business?
In this interview with Help Net Security, Adam Bennett, CEO at Red Piranha, discusses Extended Detection and Response and their flagship product – Crystal Eye XDR. We’ve been hearing a lot about XDR in the past year. What is it, and what se…Read More Crystal Eye XDR: Protect, detect and respond to threats from a single unified platform
Kubestriker is an open-source, platform-agnostic tool for identifying security misconfigurations in Kubernetes clusters. It performs a variety of checks on a range of services and open ports on the Kubernetes platform, helps safeguard against potential…Read More Kubestriker: A security auditing tool for Kubernetes clusters
Data loss prevention (DLP) has become even more important in the last year. Since the pandemic has made companies shif to a remote workforce model, cybersecurity threats have become increasingly complex and data security even more fragile. Companies ne…Read More How do I select a DLP solution for my business?
After earning his master’s degree in computer science and working on the IT side of the business at a number of large financial services organizations, Bobby Balanchdran observed one interesting thing: the legal department in these organizations had be…Read More Chief Legal Officers face mounting compliance, privacy and cybersecurity obligations
A recent report predicts that home networks, remote working software and cloud systems will be at the center of a new wave of attacks in 2021. Cybercriminals in 2021 will particularly look to home networks as a critical launch pad to compromising corpo…Read More How do I select a network monitoring solution for my business?
The most significant barrier to achieving DevSecOps is the continued perception that “Sec” is not already a part of “Dev” and “Ops”, says James Arlen, CISO at cloud data platform provider Aiven. Also, the fact this needs to be explicitly called out is …Read More Tips for boosting the “Sec” part of DevSecOps
Digital rights management (DRM) is a method to protect copyrights for digital media. In a world where technology allows us to share and copy various media and files, it is important to prevent or restrict unauthorized modification or distribution. This…Read More How do I select a DRM solution for my business?