Category: Cybersecurity

Coronavirus

Zooming in on Observability

Peter Parkanyi

We use our security observability agent, ingraind, to monitor our daily Zoom "standup" meeting, and decided to analyse the results in this blog post. ...Continue Reading: Zooming in on Observability

Read more
Cybersecurity

Introducing the Red Sift Partner Program

Neil Crossely

Red Sift unveils new partner program to boost channel revenues during global crisis Launch comes in response to growing market demand for security solutions to fight BEC and associated risks from the increasing remote workforce...Continue Reading: Introducing the Red Sift Partner Program

Read more
Coronavirus

Covid-19 phishing: 5 steps to protect your workforce

Hope Chauland

Organizations must align business security with the safety of their workforce around Covid-19 and it starts with email...Continue Reading: Covid-19 phishing: 5 steps to protect your workforce

Read more
Cybersecurity

Writing BPF code in Rust

alessandro

You don't really need to be an BPF expert to read this post, as in the next section I'm going to give a quick, super high level overview of the main concepts you need to know to understand the rest. ...Continue Reading: Writing BPF code in Rust

Read more
Cybersecurity

Interview: Tech Nation – The Past, Present and Future of Cyber Security

Randal Pinto

The digital and online world is changing quickly and constantly. Systems and security is like a world-wide game that everyone can have a go at cracking. But how does the world of cyber security look today compared to a few years ago? And what’s in store for the future?...Continue Reading: Interview: Tech Nation –…

Read more
Cybersecurity

Interview: IT Security Guru – Under the microscope: inbound versus outbound email…

Rahul Powar

Ultimately, it boils down to a question of trust. We’re now less inclined to trust the emails we receive and we’re less inclined to trust the technology that is supposed to defend us against the untrustworthy emails...Continue Reading: Interview: IT Security Guru – Under the microscope: inbound versus outbound email protection

Read more