Pegasystems, a global leader in AI-powered decisioning and workflow automation, is a strategic partner for many of the world’s leading brands. The company’s role as an enterprise software provider means it often operates under the radar of the general public — but that doesn’t shield it from cyberattacks. Upon joining Pegasystems (Pega) in 2019, Director of Corporate … [Read more...] about Pegasystems Consolidates Endpoint, Identity and Cloud Security with CrowdStrike
security
CrowdStrike to Acquire Adaptive Shield to Deliver Integrated SaaS Security Posture Management
Today, at the inaugural Fal.Con Europe, I’m excited to announce CrowdStrike’s agreement to acquire SaaS security leader Adaptive Shield. This acquisition will propel CrowdStrike to become the only cybersecurity vendor to provide full protection against identity-based attacks across the modern cloud ecosystem — from on-premises Active Directory to cloud-based identity providers … [Read more...] about CrowdStrike to Acquire Adaptive Shield to Deliver Integrated SaaS Security Posture Management
Learn Key Identity Security Tactics in This Expert Webinar
Nov 02, 2024The Hacker NewsSaaS Security / Identity Security Did you know that advanced threat actors can infiltrate the identity systems of major organizations and extract sensitive data within days? It's a chilling reality, becoming more common and concerning by the day. These attackers exploit vulnerabilities in SaaS and cloud environments, using compromised identities to … [Read more...] about Learn Key Identity Security Tactics in This Expert Webinar
Build Custom Apps to Solve Tough Security Challenges
Security teams can easily build custom applications with a unified homepage experience, intuitive visual builder and access to modern low-code and no-code tools. This builder guides them through the building blocks necessary to develop an application before it is released and installed. A new learn page allows app developers to easily access guided documentation and … [Read more...] about Build Custom Apps to Solve Tough Security Challenges
Acronym Overdose – Navigating the Complex Data Security Landscape
In the modern enterprise, data security is often discussed using a complex lexicon of acronyms—DLP, DDR, DSPM, and many others. While these acronyms represent critical frameworks, architectures, and tools for protecting sensitive information, they can also overwhelm those trying to piece together an effective security strategy. This article aims to demystify some of the most … [Read more...] about Acronym Overdose – Navigating the Complex Data Security Landscape
Hackers Abuse EDRSilencer Tool to Bypass Security and Hide Malicious Activity
Oct 16, 2024Ravie LakshmananEndpoint Security / Malware Threat actors are attempting to abuse the open-source EDRSilencer tool as part of efforts to tamper endpoint detection and response (EDR) solutions and hide malicious activity. Trend Micro said it detected "threat actors attempting to integrate EDRSilencer in their attacks, repurposing it as a means of evading … [Read more...] about Hackers Abuse EDRSilencer Tool to Bypass Security and Hide Malicious Activity
Google Adds New Pixel Security Features to Block 2G Exploits and Baseband Attacks
Oct 03, 2024Ravie LakshmananMobile Security / Technology Google has revealed the various security guardrails that have been incorporated into its latest Pixel devices to counter the rising threat posed by baseband security attacks. The cellular baseband (i.e., modem) refers to a processor on the device that's responsible for handling all connectivity, such as LTE, 4G, and 5G, … [Read more...] about Google Adds New Pixel Security Features to Block 2G Exploits and Baseband Attacks
Elevating Identity Security at Fal.Con 2024
This blog is part of a five-part series previewing Fal.Con 2024 content. Read previews for cloud, AI and next-gen SIEM. In today’s threat landscape, identity is a primary adversary target and plays a central role in most breaches. The CrowdStrike 2024 Threat Hunting Report states 5 of the top 10 MITRE tactics observed in the past 12 months are identity-based. The reality is … [Read more...] about Elevating Identity Security at Fal.Con 2024
Take Your Endpoint Security to New Heights at Fal.Con 2024
This blog is part of a five-part series previewing Fal.Con 2024 content. Read previews for cloud, AI, next-gen SIEM and identity. Endpoint security remains the foundation of modern cyber defense. It’s where all businesses operate and most attacks begin. For these reasons, organizations must evolve their endpoint security to stay ahead of increasingly fast and stealthy threat … [Read more...] about Take Your Endpoint Security to New Heights at Fal.Con 2024
Fal.Con 2024 – Innovations in Cloud Security
As we gather for Fal.Con 2024, we’re thrilled to unveil groundbreaking advancements in CrowdStrike Falcon® Cloud Security that are set to redefine cloud security. These innovations are more than just technical enhancements — they’re a bold step towards a future where unified security posture management (USPM) across cloud infrastructure, applications, data and AI becomes the … [Read more...] about Fal.Con 2024 – Innovations in Cloud Security