'

Unmasking ransomware threat clusters: Why it matters to defenders

Cybersecurity analysts have typically dissected ransomware attacks in isolation, scrutinizing the tactics, techniques, and procedures (TTPs) unique to each incident. However, new Sophos research shows why it is critical for defenders to look beyond the surface as attacks executed by different threat groups often display noteworthy similarities. These so-called ransomware threat clusters offer insights into … Read more

China’s offensive cyber operations support “soft power” agenda in Africa

Targeted cyber intrusions against key industrial sectors in various African nations conspicuously align with China’s broader soft power and technological agenda in the region, encompassing critical areas such as the telecommunication sector, financial institutions, and governmental bodies. That’s according to a new report from SentinelOne, which has observed sustained tasking toward strategic intrusions by Chinese … Read more

Scaling Rust Adoption Through Training

Scaling Rust Adoption Through Training

Posted by Martin Geisler, Android team Android 14 is the third major Android release with Rust support. We are already seeing a number of benefits: Productivity: Developers quickly feel productive writing Rust. They report important indicators of development velocity, such as confidence in the code quality and ease of code review. Security: There has been … Read more

Proactive OT security requires visibility + prevention

Identifying what’s on your network and detecting if any issues arise is important, but isn’t it ideal to prevent an issue in the first place?  Shadow OT can leave anyone suddenly put in charge of cybersecurity for industrial control systems (ICS) feeling overwhelmed. While visibility is the logical first step to understanding what’s on your … Read more

Cloudflare Email Security now works with CrowdStrike Falcon LogScale

Cloudflare Email Security now works with CrowdStrike Falcon LogScale

We are excited to announce an extended partnership between CrowdStrike and Cloudflare to bring together Cloudflare Email Security and CrowdStrike Falcon® LogScale. With this integration, joint customers who have both Falcon LogScale and Cloudflare Email Security can now send detection data to be ingested and displayed within their Falcon LogScale dashboard. What is CrowdStrike Falcon … Read more

WatchGuard acquires CyGlass for AI-powered network anomaly detection

WatchGuard® Technologies, provider of unified cybersecurity, today announced the acquisition of CyGlass Technology Services, a provider of cloud and network-centric threat detection and response solutions that help organisations see risks, stop threats, and prove compliance. CyGlass’s cloud-native platform utilises advanced artificial intelligence (AI) and machine learning (ML) capabilities to deliver enterprise-class cyber defence across hybrid … Read more

Key findings from the CISA 2022 Top Routinely Exploited Vulnerabilities report

Key findings from the CISA 2022 Top Routinely Exploited Vulnerabilities report

One of the best ways to mitigate risk and insulate your organization from malicious actors is to understand where they’re focusing their time and attention as well as leveraging recommended practices to avoid becoming a victim. The recently published CISA 2022 Top Routinely Exploited Vulnerabilities report was compiled with international partners from Australia, Canada, New … Read more

SME Cyber Security – Time for a New Approach?

The UK is home to around 5.5 million Small and Medium-sized Enterprises (SMEs). They collectively account for 99.9% of businesses, generating three fifths of employment, and with a combined turnover of £2.3 trillion. As such, they represent a vital element of the economy and a significant national asset, which in turn, highlights a need to … Read more

Keeper Security Named a Market Leader in Privileged Access Management (PAM) by Enterprise Management Associates

Keeper Security Named a Market Leader in Privileged Access Management (PAM) by Enterprise Management Associates

This week, Keeper Security announced that it has been identified as a leading privileged access management (PAM) provider for its product strength and cost-efficiency. The recognition comes from analyst firm Enterprise Management Associates® (EMA) in its latest research report: EMA Radar for Privileged Access Management. EMA provides an unbiased view of the market landscape, ensuring organisations … Read more