Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Falcon Cloud Security Attack Path Analysis: Demo Drill Down

It’s a race with the adversary to close every gap they’re using to break in, which starts with unified visibility of their attack path - from endpoint to cloud. See how Falcon Cloud Security’s Attack Path Analysis automatically stitches together the complete trajectory of an adversary, cutting investigation and response time.

Falcon Cloud Security IaC Scanning: Demo Drill Down

Infrastructure-as-code can introduce fundamental risks into your cloud estate. If there’s a misconfiguration or vulnerability, they’ll now be present in every application. See how Falcon Cloud Security’s IaC scanning proactively stops misconfigurations and vulnerabilities from being introduced in the first place.

Introducing Cloudflare's 2023 phishing threats report

After shutting down a ‘phishing-as-a-service’ operation that impacted thousands of victims in 43 countries, INTERPOL recently noted, “Cyberattacks such as phishing may be borderless and virtual in nature, but their impact on victims is real and devastating.” Business email compromise (BEC), a type of malware-less attack that tricks recipients into transferring funds — for example — has cost victims worldwide more than $50 billion, according to the FBI.

Centralized Log Management for TISAX Compliance

The Trusted Information Security Assessment Exchange (TISAX) is the certification process for engaging in the Verband der Automobilindustrie (VDA), the German Association of the Automotive Industry, Information Security Assessment (ISA). The ENX Association, a collection of automobile manufacturers, suppliers, and four national automotive associations, established TISAX to create an overarching industry standard and make reporting more efficient.

How our engineering team improves the on-call experience with Tines

This is the first of a series of posts about ways we use Tines at Tines to simplify our processes. I’m Izabela from the engineering team and will share how we improve the on-call experience with our own product. When it comes to on-call, there are differing views. For some, it comes as an easy and enjoyable task. For others, a stressful time on their calendars. At Tines, we have two types of on-call: daytime and out-of-hours.

How to Respond to Ivanti EPMM/MobileIron Vulnerabilities (CVE-2023-35078)

There are three vulnerabilities impacting Ivanti Endpoint Manager Mobile (EPMM), formerly known as MobileIron Core: CVE-2023-35078 and CVE-2023-35082, which both enable authenticated bypass for unauthorized access; and CVE-2023-35081, which allows directory traversal with privilege escalation and arbitrary file write. These Ivanti EPMM vulnerabilities have been observed in active cyber attacks on systems using the affected versions.

Cato named a Leader in Forrester's 2023 Wave for Zero Trust Edge

Today, Forrester released The Forrester Wave™: Zero Trust Edge Solutions, Q3 2023 Report. Zero Trust Edge (ZTE) is Forrester’s name for SASE. We were delighted to be described as the “poster child” of ZTE and SASE and be named a “Leader” in the report.