The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.


Don't call it a SIEM - How USM Anywhere does threat detection and response differently

Security Information and Event Management (SIEM) solutions have been the foundation of enterprises’ security operations and threat detection & response. Even though USM Anywhere has many key SIEM features, it is much more than a SIEM. Why? To perform threat detection, SIEMs and purpose-built threat consoles collect data from security devices. These include network firewalls, endpoint devices, & vulnerability managers to directly from the cloud.


Cybersecurity risk management explained

Cybersecurity risk management is the practice of prioritizing cybersecurity defensive measures based on the potential adverse impact of the threats they're designed to address. Establishing a risk management approach to cybersecurity investment acknowledges that no organization can completely eliminate every system vulnerability or block every cyber-attack.


Privacy shield judgement points to a decentralised future

In something reminiscent of David and Goliath, the stone of Max Schrems’ landmark legal challenge has shattered the Privacy Shield that protects centralised service providers. This is a really big deal. It means that the personal data of an EU data subject (‘person’) cannot be transferred from within the EU to the US without an appropriate mechanism.

TSFTDC LinkedIn Heartbleed V3

Warning! The story you are about to hear is true. See for yourself how Linkedin used SaltStack to protect its data center and millions of users from the Heartbleed virus. If you’d like the power to control the security and reliability of your digital infrastructure, simply schedule a demo and see for yourself how SaltStack can help efficiently automate your security and IT operations needs. Just click the link and we'll take it from there!

The State of Civil Aviation Cybersecurity

Technology and cyber systems have become essential components of modern society. Despite the benefit of cyber technologies, insecurities arise. These could affect all systems and infrastructures. More than that, the threat of a cyberattack could very well have a transnational component and effect as worldwide systems become increasingly interconnected.


How Can Companies Protect Themselves Against Drive-By Cyber Attacks?

Drive-by download attack is one of the most popular methods employed by hackers nowadays. What is it? How can you protect your organization from it? Keep reading to learn! Malware attacks have been preserving their popularity amongst the hackers for a while. They are relatively easy to implement when targeting medium to small scale organizations, they can go unnoticed for a very long time and extract information from the target quietly.

SaltStack LIVE from BlackHat USA 2020 with Thomas Hatch - Look at all these holes!

There are many old vulnerabilities that are being exploited, why are they not fixed? Some of the most exploited vulnerabilities are still in the wild today, despite being several years old. These include web platforms, Windows bugs and more. Come and learn why these issues are still present in your infrastructure, lurking under the surface for so many years.

How Calico Enterprise Enables Your Kubernetes Multi-Tenancy

In this talk, we will explore Kubernetes multi tenancy concepts and design patterns. Specifically, we will go over the network and network security design patterns needed for enabling multi tenancy within your k8s clusters using key capabilities of Calico Enterprise. Explore multi-tenancy use-cases in Kubernetes Learn about the core concepts and design patterns behind multi tenancy in Kubernetes Understand the key capabilities of Calico and Calico Enterprise that enable multi tenancy

Poor Data Governance Cost Capital One $80 Million

Last year, Capital One showed the world why data governance is so important when it was the victim of a massive data breach that exposed the personal data of 106 million customers. It is still one of the biggest hacks ever recorded, and the company has now been fined $80 million by banking regulators. A “what’s in your wallet” meme would work great here, but let’s keep this classy.