English News

Demystifying XDR: Where SIEM and XDR Collide

Demystifying XDR: Where SIEM and XDR Collide

Innovations solve longstanding problems in creative, impactful ways — but they also raise new questions, especially when they’re in the liminal space between being an […]
The Big Target on Cyber Insurers‘ Backs

The Big Target on Cyber Insurers‘ Backs

Here at IntSights, a Rapid7 company, our goal is to equip organizations around the world with an understanding of the threats facing them in today’s […]
Prioritizing Cybersecurity Risk for Enterprise Risk Management

Prioritizing Cybersecurity Risk for Enterprise Risk Management

Abstract This document is the second in a series that supplements NIST Interagency/Internal Report (NISTIR) 8286, Integrating Cybersecurity and Enterprise Risk Management (ERM). This series provides […]
eBook: The CrowdStrike Security Cloud

eBook: The CrowdStrike Security Cloud

Transforming Security for Today’s Modern Cloud Business Upheaval is arguably one of the best words there is to describe the effects of recent events on […]
The Maturation of Cloud-native Security: Securing Modern Apps and Infrastructure

The Maturation of Cloud-native Security: Securing Modern Apps and Infrastructure

How an Integrated Defense-in-depth Platform Fills Gaps in Inconsistencies, Misconfigurations and Visibility More than ever, organizations are grappling with how to secure cloud-native applications. Composed […]
First Code of Conduct for Data Protection in Cloud Infrastructure goes live

First Code of Conduct for Data Protection in Cloud Infrastructure goes live

First services declared by multiple cloud infrastructure providers + Clear steps to GDPR compliance verified by independent Monitoring Bodies + Goes beyond GDPR requirements, by […]
Securing Distributed Energy Resources

Securing Distributed Energy Resources

Cybersecurity guidance to help energy companies protect IIoT data integrity and communications Distribution grid operators must protect the digital communication, data, and control of cyber-physical […]
WatchGuard’s Threat Lab Analyzes the Latest Malware and Internet Attacks

WatchGuard’s Threat Lab Analyzes the Latest Malware and Internet Attacks

Internet Security Report – Q3 2021 WatchGuard’s Threat Lab (previously the LiveSecurity Threat Team) is a group of dedicated threat researchers committed to helping you […]
DDoS-Sniper: sophisticated attacker analyzed

DDoS-Sniper: sophisticated attacker analyzed

99% of DDoS-DFIR (primary the forensic part) consist of botnet-analysis and dealing with the „usual suspects“ like booter-services and smaller botnets. But every once in […]
Promoting Data Protection by Design: Exploring Techniques

Promoting Data Protection by Design: Exploring Techniques

On the occasion of Data Protection Day, the European Union Agency for Cybersecurity (ENISA) explores how to engineer data protection principles. The European Union Agency […]
Gartner Predicts Hyperscalers’ Carbon Emissions Will Drive Cloud Purchase Decisions by 2025

Gartner Predicts Hyperscalers’ Carbon Emissions Will Drive Cloud Purchase Decisions by 2025

Sustainability Investments to Increase as ESG Reporting Receives Growing Levels of Enterprise Attention By 2025, the carbon emissions of hyperscale cloud services will be a […]
Buyers Guide: CrowdStrike 2021 Cloud Workload Protection Platform (CWPP)

Buyers Guide: CrowdStrike 2021 Cloud Workload Protection Platform (CWPP)

Finding the right CWPP to secure your cloud apps, infrastructure and data Cloud adoption remains a key driver for digital transformation and growth for today’s […]
CrowdStrike-Whitepaper: Five steps your organization can take to improve security in a multi-cloud environment

CrowdStrike-Whitepaper: Five steps your organization can take to improve security in a multi-cloud environment

Embracing the cloud is critical to realizing digital transformation initiatives and long-term growth plans. But while the cloud may grant organizations newfound agility, it can […]
CISA Urges Organizations to Implement Immediate Cybersecurity Measures to Protect Against Potential Threats

CISA Urges Organizations to Implement Immediate Cybersecurity Measures to Protect Against Potential Threats

In response to recent malicious cyber incidents in Ukraine—including the defacement of government websites and the presence of potentially destructive malware on Ukrainian systems—CISA has […]
Beware of Digital ID attacks: you Face can be Spoofed

Beware of Digital ID attacks: you Face can be Spoofed

Digital idntification is the focus of two new reports by the European Union Agency for Cybersecurity (ENISA): an analysis of self-sovereign identity (SSI) and a […]
IBM Acquires Envizi to Help Organizations Accelerate Sustainability Initiatives and Achieve Environmental Goals

IBM Acquires Envizi to Help Organizations Accelerate Sustainability Initiatives and Achieve Environmental Goals

IBM today announced it has acquired Envizi, a leading data and analytics software provider for environmental performance management. This acquisition builds on IBM’s growing investments […]