Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cato: The Rise of the Next-Generation Networking and Security Platform

Today, we announced our largest funding round to date ($238M) at a new company valuation of over $3B. It’s a remarkable achievement that is indicative not only of Cato’s success but also of a broader change in enterprise infrastructure. We live in an era of digital transformation. Every business wants to be as agile, scalable, and resilient as AWS (Amazon Web Service) to gain a competitive edge, reduce costs and complexity, and delight its customers.

Breach and Attack Simulation Helps Pipeline Operators Comply with New TSA Requirements

In July of this year, the Transportation Safety Administration (TSA) released Security Directive Pipeline-2021-02D (SD-02D) Pipeline Cybersecurity Mitigation Actions, Contingency Planning, and Testing. The directive—aimed at owners and operators of liquid and natural gas pipelines or facilities designated as critical infrastructure—outlines requirements for enhancing cyber resilience through the implementation of a TSA-approved cybersecurity implementation plan (CIP).

Romance Scams That Run Your Crypto Wallet Dry

Scammers are using dating sites to lure victims into phony cryptocurrency investment schemes, according to Sean Gallagher at Sophos. These types of investment scams are known as “pig butchering,” loosely translated from the Chinese phrase “sha zhu pan.” In this case, the scammers convince the victim to participate in a liquidity pool arrangement, a legitimate but risky cryptocurrency investment technique.

China's Cyber Offensive: FBI Director Reveals Unmatched Scale of Hacking Operations

WASHINGTON – In a startling revelation, FBI Director Chris Wray disclosed at a recent conference that China's cyber espionage capabilities are so extensive, they bigger than the efforts of all other major nations combined. While the U.S. government has long been cautioning against the cyber threats emanating from China, Wray's statements took the conversation to a new level of urgency.

The Consequences of Non-Compliance in Cybersecurity: Risks and Penalties

Non-compliance in cybersecurity marks a grave oversight. It involves neglecting established security protocols, leaving organizations vulnerable to malicious actors. Read on as we examine the potential risks of non-compliance, including heightened susceptibility to cyberattacks, the specter of data breaches, and the erosion of a company's hard-earned reputation.

General Data Protection Regulation (GDPR) - The Story So Far

Do you remember where you were on 25th May 2018? Perhaps you were enjoying a Friday night drink with friends. Perhaps you were with family, relaxing after a busy week at work. I was actually having a GDPR Birthday party with friends and colleagues because 25th May 2018 was a landmark day for the world of Data Protection (yes, seriously, we had a party!). But the funny thing about the effective date of the then-new General Data Protection Regulation (GDPR) was that many saw it as a date to dread.

Caesars Entertainment Gets Hacked, Exposing Countless Gamblers

Caesars Entertainment is one of the largest casino companies in the United States and is well-known for its loyalty program. The company serves countless customers in Las Vegas and elsewhere throughout the world. The massive loyalty program takes in data from all of Caesars customers, and that program may have just backfired on the company, potentially hurting many of its customers in the process.

Random but Memorable - Episode 11.4: Resilient Leader Rock Band with Sarah Armstrong-Smith

How can security leaders be effective and resilient in one of the world's most fast-paced sectors? We're joined by Chief Security Advisor at Microsoft, Sarah Armstrong-Smith, who offers her advice on crisis management and building a human-first security culture. 🚨🧑‍💻 We also serve up our latest 1Password tips in Did You Know? Plus, an episode wouldn't be complete without a game of HackerNoHacker! 🔐💻

Shift Left: A One-of-a-Kind Developer Community in the Cybersecurity Space

To foster a culture of data protection that enhances global enterprises through secure application development, Protegrity developed the Shift Left Developer community. Our community recognizes the discrepancies and challenges data teams face when it comes to implementing solutions – both technologically and professionally – and offers the resources, guides, and cross-collaboration from teams around the world to help develop effective and efficient approaches to integration processes.

Kroll named as an Overall Leader in KuppingerCole 2023 Managed Detection & Response Leadership Compass Report

The 2023 KuppingerCole Leadership Compass Report: Managed Detection & Response Services provides an overview of the market for MDR services that manage a collection of cybersecurity technologies to provide advanced cyber threat detection and response capabilities. In the report, Kroll was identified as a leading MDR provider, alongside just seven other MDR vendors selected from the across the whole MDR market.