Rate Companies (formerly Guaranteed Rate) is the second-largest retail mortgage lender in the U.S. With billions of sensitive transactions flowing through its systems daily, the company is a prime target for cybercriminals. “Because of the nature of our business, we face some of the most advanced and persistent cyber threats out there,” said Katherine Mowen, SVP of … [Read more...] about Rate Companies Scales Cybersecurity with Falcon Flex
How Generative AI Can Transform the Future of Identity and Access Management
Identity and Access Management (IAM) plays a vital role in keeping enterprise systems secure by ensuring that only the right people can access sensitive data, applications, and systems. As businesses continue to embrace digital platforms, the demand for stronger and more adaptable IAM solutions is growing. Traditional systems often struggle to keep pace with evolving security … [Read more...] about How Generative AI Can Transform the Future of Identity and Access Management
How Cisco Uses Isovalent to Secure Cloud Workloads
As cloud environment evolve, efficient and effective workload security has been at the top of the list. At Cisco, we have integrated the Isovalent platform into our infrastructure to ensure our cloud workloads are protected without compromising on performance. Why Isovalent? The Isovalent platform is based on the eBPF (extended Berkeley Packet Filter) technology that … [Read more...] about How Cisco Uses Isovalent to Secure Cloud Workloads
Cloud Data Logs: Heroes of Detection and Response
These logs provide deep visibility into the resource and service layers of cloud environments, enabling security teams to monitor for suspicious behavior, identify vulnerabilities and detect unauthorized actions. In the event of a breach, cloud logs are essential for incident response. They serve as the digital evidence needed to understand how an attack unfolded, which … [Read more...] about Cloud Data Logs: Heroes of Detection and Response
His Majesty King Charles III visits Apple’s U.K. headquarters
On Thursday, December 12, His Majesty King Charles III visited Apple’s Battersea office in London to meet Apple employees, members of the British creative community, and students who have learned vital new skills like coding from educational programs supported by Apple and U.K.-based nonprofit The King’s Trust. Team members from … [Read more...] about His Majesty King Charles III visits Apple’s U.K. headquarters
Secure Workload 3.10 Has It
In recent years, cyberattacks have become more sophisticated and pervasive, easily outpacing traditional security measures like perimeter firewalls. This shift has highlighted the critical need for advanced security strategies. Microsegmentation has emerged as a game-changing approach, enabling robust protection across customers’ increasingly complex networks, which now span … [Read more...] about Secure Workload 3.10 Has It
Latest Product Updates and Features in Logz.io
TL;DR Enhanced Visualizations in Explore Switch between linear and logarithmic scales Add deployment markers for better context Compare data across time periods Warm Tier Log Storage New storage option bridging Hot and Cold Tiers. Contact your customer success team for details. Expanded Trace View Gain multi-telemetry insights alongside logs for bottleneck detection and … [Read more...] about Latest Product Updates and Features in Logz.io
BLG Reduces False Positives with CrowdStrike
Borden Ladner Gervais LLP is Canada’s largest law firm with 850 lawyers and 2,300 employees working in five offices spread across the country. The firm is 200 years old and fully bilingual across its wide array of practices, which include intellectual property, mergers and acquisitions, health law, commercial law, cybersecurity and privacy. BLG’s lawyers are proud of their … [Read more...] about BLG Reduces False Positives with CrowdStrike
Credentials and API Keys Leaking Online
Dec 12, 2024Ravie LakshmananVulnerability / Cloud Security Cybersecurity researchers are warning that thousands of servers hosting the Prometheus monitoring and alerting toolkit are at risk of information leakage and exposure to denial-of-service (DoS) as well as remote code execution (RCE) attacks. "Prometheus servers or exporters, often lacking proper authentication, … [Read more...] about Credentials and API Keys Leaking Online
Which encrypted file storage to choose?
No one can deny the convenience of cloud file-storage services like Dropbox or OneDrive. The one drawback is that cybercriminals, intelligence agencies, or the hosting provider itself can view your cloud-based files without authorization. But there’s a more secure alternative: encrypted cloud file-storage. Some call it end-to-end encryption (E2EE) — similar to Signal and … [Read more...] about Which encrypted file storage to choose?