Category: EN

Six metrics policymakers need to track cyber resilience

Most countries are still making national cyber policy decisions without reliable numbers. Regulations often focus on incident reporting after damage is done, but they fail to give governments a forward-looking picture of resilience. A new report from Zurich Insurance Group…

Exciting Developments in Cloud-Native Security

Are Machine Identities the Hidden Key to Cloud-Native Security? Effective cybersecurity strategies rely not only on safeguarding human credentials but also on ensuring the security of non-human identities (NHIs). These machine identities, often overshadowed by their human counterparts, play a…

Hackers Actively Compromising Databases Using Legitimate Commands

A sophisticated new breed of ransomware attacks is leveraging legitimate database commands to compromise organizations worldwide, bypassing traditional security measures through “malware-less” operations. Unlike conventional ransomware that encrypts files using malicious binaries, threat actors are exploiting exposed database services by…

How to configure and verify ACM certificates with trust stores

In this post, we show how to configure customer trust stores to work with public certificates issued through AWS Certificate Manager (ACM). Organizations can encounter challenges when configuring trust stores for ACM certificates and incorrect trust store configuration can lead…