Organizations increasingly look to observability to solve critical challenges
Enterprise observability practices: Opportunities, challenges, and the growing role of AIOps Observability is now firmly established in organizations with 78% of enterprises and large midmarket companies having an observability practice in place, according to recent research by Enterprise Strategy Group (ESG). The research findings, described in Distributed Cloud Series — Observability and Demystifying AIOps, gauge […]
The modern next gen SOC powered by AI
AI is among the most disruptive technologies of our time. While AI/ML has been around for decades, it has become a hot topic with continued innovations in generative AI (GenAI) from start-up OpenAI to tech giants like Microsoft, Google, and Meta. When large language models (LLMs) combined with big data and behavior analytics, AI/ML can […]
Sophos NDR is now available on AWS – Sophos News
Sophos NDR can now be deployed in AWS AMI for all NDR and XDR/MDR customers with a licensed integration pack that requires a log collector. Sophos NDR in AWS offers several advantages for threat detection and response: What you get Cloud-native security monitoring: AWS-native NDR sensors can now efficiently provide visibility into the network traffic […]
New Migo malware disables protection features on Redis servers
Security researchers discovered a new campaign that targets Redis servers on Linux hosts using a piece of malware called ‘Migo’ to mine for cryptocurrency. Redis (Remote Dictionary Server) is an in-memory data structure store used as a database, cache, and message broker known for its high performance, serving thousands of requests per second for real-time […]
Cybersecurity for Healthcare—Diagnosing the Threat Landscape and Prescribing Solutions for Recovery
On Thanksgiving Day 2023, while many Americans were celebrating, hospitals across the U.S. were doing quite the opposite. Systems were failing. Ambulances were diverted. Care was impaired. Hospitals in three states were hit by a ransomware attack, and in that moment, the real-world repercussions came to light—it wasn’t just computer networks that were brought to […]
Iranian APTs Dress Up As Hacktivists for Disruption, Influence Ops
Iranian state-backed advanced persistent threat (APT) groups have been masquerading as hacktivists, claiming attacks against Israeli critical infrastructure and air defense systems. While threat actors in Gaza itself have been radio silent, the majority of cyberattacks against Israel in recent months have been carried out by hacktivist operations and nation-state actors “playing them on TV,” […]
Okta vs. Microsoft Entra ID (Azure Active Directory) 2024: IAM Software Comparison
Employees today are logging into more and more applications from a variety of devices and locations. This can create challenges for IT departments for security and efficiency reasons. This all makes IAM solutions critical to any modern business, and two popular options in that category are Okta and Microsoft Entra ID (formerly Azure Active Directory). […]