In the modern enterprise, data security is often discussed using a complex lexicon of acronyms—DLP, DDR, DSPM, and many others. While these acronyms represent critical frameworks, architectures, and tools for protecting sensitive information, they can also overwhelm those trying to piece together an effective security strategy. This article aims to demystify some of the most … [Read more...] about Acronym Overdose – Navigating the Complex Data Security Landscape
landscape
Istio Roadmap, Ambient Mesh, and the Service Mesh Landscape
In the dynamic landscape of microservices and cloud-native architectures, the role of service meshes has become increasingly crucial. These programmable frameworks empower users to seamlessly connect, secure, and observe their microservices, relieving them of the complexities associated with these critical tasks within their applications. Istio, a leading service mesh project, … [Read more...] about Istio Roadmap, Ambient Mesh, and the Service Mesh Landscape
The personal threat landscape: securing yourself smartly
If you try to protect yourself against every threat in the world, you’ll soon run out of energy and make your life unbearable. Three-factor authentication here, a twenty-character password with musical notes and Chinese characters there, different browsers for different websites, and abstinence from social media don’t exactly sound life-asserting. What hurts the most is that … [Read more...] about The personal threat landscape: securing yourself smartly
The Changing Landscape of DevSecOps
Application developers have always had a tricky balance to maintain between speed and security, two requirements that may often feel at odds with each other. Practices that increase speed also pressure development teams to ensure that vulnerable code is identified and remediated without slowing development. As companies embrace digital transformation initiatives, the need to … [Read more...] about The Changing Landscape of DevSecOps
How CrowdStrike Supports the ICS/OT Landscape With Rockwell
CrowdStrike and Rockwell Automation have announced a partnership to help joint customers secure the expanded threat surface of the industrial control systems (ICS) and operational technology (OT) controlling our energy, manufacturing our goods and operating our medical equipment. This has been a greenfield area for security due to the real-time nature of these systems and the … [Read more...] about How CrowdStrike Supports the ICS/OT Landscape With Rockwell
Threat Landscape Trends: Endpoint Security, Part 2
Part 2: LOLBins, operating systems, and threat types Being aware of what’s occurring on the threat landscape can be a valuable tool when it comes to defending your organization. If you’re well informed, that puts you in a good position to decide how best to protect your assets and allocate resources accordingly. While it’s important to stay up to date with the latest … [Read more...] about Threat Landscape Trends: Endpoint Security, Part 2
Threat Landscape Trends: Endpoint Security
Part 1: Critical severity threats and MITRE ATT&CK tactics In the ongoing battle to defend your organization, deciding where to dedicate resources is vital. To do so efficiently, you need to have a solid understanding of your local network topology, cloud implementations, software and hardware assets, and the security policies in place. On top of that, you need to have an … [Read more...] about Threat Landscape Trends: Endpoint Security
The Manufacturing Threat Landscape in 2020
Since January 2020, the CrowdStrike® Falcon OverWatch™ managed threat hunting team has observed an escalation in hands-on-keyboard activity. The COVID-19 pandemic has fundamentally shifted the way businesses are working, and adversaries are taking full advantage of businesses that fail to adapt their security postures in response. In just the first six months of 2020, … [Read more...] about The Manufacturing Threat Landscape in 2020
Open Document format creates twist in maldoc landscape
Threat Research By Warren Mercer and Paul Rascagneres. Cisco Talos recently observed attackers changing the file formats they use in an attempt to thwart common antivirus engines. This can happen across other file formats, but today, we are showing a change of approach for an actor who has deemed antivirus engines perhaps “too good” at … [Read more...] about Open Document format creates twist in maldoc landscape