Darryl Peek has always supported the public sector — his career has taken him to various private and public enterprises within a public sector team. Darryl’s family has a long history of military service — his brother was in the US Navy, his father was an airman, and his grandfathers were in the US Army. He joined Lockheed Martin, his first job out of college, for that reason. … [Read more...] about Darryl Peek on working for the public sector at Elastic
News
Falcon Fund Invests in Nagomi
Preventable breaches are a common problem. According to research by Nagomi, a leader in the nascent field of automated security control assessment, 80% of breached organizations already had a tool in place that could have prevented it. One solution is to maximize the use of security tools they already have. Many enterprises grapple with ineffective and reactive security … [Read more...] about Falcon Fund Invests in Nagomi
Severe Flaws Disclosed in Brocade SANnav SAN Management Software
Apr 26, 2024NewsroomSupply Chain Attack / Software Security Several security vulnerabilities disclosed in Brocade SANnav storage area network (SAN) management application could be exploited to compromise susceptible appliances. The 18 flaws impact all versions up to and including 2.3.0, according to independent security researcher Pierre Barre, who discovered and reported … [Read more...] about Severe Flaws Disclosed in Brocade SANnav SAN Management Software
Unveiling Jamba: AI21’s Groundbreaking Hybrid SSM-Transformer Open-Source Model
Production-grade Mamba-style model offers unparalleled throughput , only model in its size class that fits 140K context on a single GPU AI21, a leader in AI systems for the enterprise, unveiled Jamba, the production-grade Mamba-style model – integrating Mamba Structured State Space model (SSM) technology with elements of traditional Transformer architecture. Jamba marks a … [Read more...] about Unveiling Jamba: AI21’s Groundbreaking Hybrid SSM-Transformer Open-Source Model
CrowdStrike and Google Cloud Expand Strategic Partnership
CrowdStrike and Google Cloud today debuted an expanded strategic partnership with a series of announcements that demonstrate our ability to stop cloud breaches with industry-leading AI-powered protection. These new features and integrations are built to protect Google Cloud and multi-cloud customers against adversaries that are increasingly targeting cloud environments. At a … [Read more...] about CrowdStrike and Google Cloud Expand Strategic Partnership
April 2024 Patch Tuesday: Updates and Analysis
Microsoft has released security updates for 150 vulnerabilities in its April 2024 Patch Tuesday rollout, a much larger amount than in recent months. There are three Critical remote code execution vulnerabilities (CVE-2024-21322, CVE-2024-21323 and CVE-2024-29053), all of which are related to Microsoft Defender for IoT, Microsoft’s security platform for IoT devices. April 2024 … [Read more...] about April 2024 Patch Tuesday: Updates and Analysis
Network Threats: A Step-by-Step Attack Demonstration
Follow this real-life network attack simulation, covering 6 steps from Initial Access to Data Exfiltration. See how attackers remain undetected with the simplest tools and why you need multiple choke points in your defense strategy. Surprisingly, most network attacks are not exceptionally sophisticated, technologically advanced, or reliant on zero-day tools that exploit … [Read more...] about Network Threats: A Step-by-Step Attack Demonstration
How to Use Raw Data in Web Analytics
Raw data, the fundamental building block of accurate web analytics, remains an underutilized asset in many organizations that opt for sampled data due to its simplicity and ease of management. This article explores the benefits and challenges of using raw data in analytics, and discusses its potential use cases for gaining valuable insights. What is raw data? Raw data is … [Read more...] about How to Use Raw Data in Web Analytics
CrowdStrike Extends Identity Security Capabilities to Stop Attacks in the Cloud
Two recent Microsoft breaches underscore the growing problem of cloud identity attacks and why it’s critical to stop them. While Microsoft Active Directory (AD) remains a prime target for attackers, cloud identity stores such as Microsoft Entra ID are also a target of opportunity. The reason is simple: Threat actors increasingly seek to mimic legitimate users in the target … [Read more...] about CrowdStrike Extends Identity Security Capabilities to Stop Attacks in the Cloud