CACTUS Qlik Ransomware: Vulnerabilities Exploited

A cyberattack campaign dubbed the CACTUS Qlik Ransomware has become prominent in ransomware attacks on BI systems. Researchers have warned of threat actors exploiting three Qlik security vulnerabilities to target different organizations ...
SentinelOne Uptycs Lacework Palo Alto CNAPP cloud security misconfiguration multi-cloud security Cloudflare cloud disaster recovery DR security

Lacework Adds Attack Path Mapping to Cybersecurity Platform

Lacework today announced it has added an attack path analysis tool to its cloud-native application protection platform (CNAPP) that visually surfaces how multiple threat vectors could be combined to compromise an IT ...
Security Boulevard
FTC ai data privacy

Why Modern Cybersecurity Pros Need Data Visualization

The saying, “a picture is worth a thousand words,” coined by Norwegian playwright Henrik Ibsen, posited that visualization is often the fastest route to understanding. Advertisers have lived by this adage for ...
Security Boulevard

Dashboards: una herramienta eficaz de ciberseguridad

Los datos solo son tan buenos como el uso que se les da. No solo el universo de ciberseguridad recopila datos, también las empresas individuales captan datos de ciberseguridad desde dentro de ...
Visualizing program structure characteristics for 12 million lines of code

Visualizing program structure characteristics for 12 million lines of code

Static code analyzers can detect security vulnerabilities. They also provide an unusual perspective on the structure of the code they analyze. This perspective offers a glimpse inside the internals of programs that ...

Dashboards: An Effective Cybersecurity Tool

Data is only as good as what you are able to do with it.  Not only does the cybersecurity universe collect data, but individual enterprises also collect cybersecurity data from within their ...

Corelight ECS Mapping: Unified Zeek data for more efficient analytics

By Ed Smith, Senior Product Marketing Manager, Corelight In addition to other great news we’ve recently shared, I’m pleased to announce that Corelight sensors now support the Elastic Common Schema (ECS) via ...
Adventures in Data Visualization (Part 2)

Adventures in Data Visualization (Part 2)

Massaging data to make it actionableIn this multi part data visualization design series, we’re exploring the concepts upon which we’ve used to build our user experience at ShiftLeft. In our product, we ...