What is a cloud native application protection platform (CNAPP)?

Credit to Author: Michael Langford| Date: Wed, 09 Feb 2022 00:00:00 +0000

We explore CNAPP, the latest industry acronym coined by the Gartner report Innovation Insight for Cloud-Native Application Protection Platforms, and why devs need to know about it.

Read more

Will Russian Oil Ban Spur Increased Cyber-Attacks

Credit to Author: Ed Cabrera| Date: Wed, 09 Mar 2022 00:00:00 +0000

President Biden banned the sale of Russian oil to the United States to deprive the Putin regime of the economic resources needed to wage war. But this may put US companies in the firing line of cyber-attacks from the east.

Read more

New Nokoyawa Ransomware Possibly Related to Hive

Credit to Author: Don Ovid Ladores| Date: Wed, 09 Mar 2022 00:00:00 +0000

In March 2022, we came across evidence that another, relatively unknown, ransomware known as Nokoyawa is likely connected with Hive, as the two families share some striking similarities in their attack chain, from the tools used to the order in which they execute various steps.

Read more

This Week in Security News March 4, 2022

Credit to Author: Jon Clay| Date: Fri, 04 Mar 2022 00:00:00 +0000

Global Cyberattacks: How to manage risk in times of chaos, and Ukraine-Russia cyber warzone splits cyber underground

Read more

Cyberattacks are Prominent in the Russia-Ukraine Conflict

Credit to Author: Trend Micro Research| Date: Thu, 03 Mar 2022 00:00:00 +0000

Alongside the physical conflict happening between Russia and Ukraine, there have also been an increasing number of alleged cyberattacks perpetrated by different groups. Our research teams have verified and validated internal data and external reports to provide accurate information that can be used to strengthen defenses against these attacks. We will continuously update this blog with validated threats as more events unfold.

Read more

Global Cyberattacks Tied to the Russian Invasion of Ukraine


Cyber-risk management and security fundamentals are the key to cyber-resilience. 5 best practices to manage your cyber risk.

Read more

5 Cloud Native Security Platform Must-haves

Credit to Author: Melanie Tafelski| Date: Wed, 02 Mar 2022 00:00:00 +0000

Discover 5 key security components to review and how to leverage a cloud native security platform with Mick McCluney (Trend Micro) and Kelly Griffin (AWS).

Read more