• Cyber Safety
  • Posts
  • KQL Queries, WAF Configs, and Token Hygiene

KQL Queries, WAF Configs, and Token Hygiene

What Actually Stopped the Breach?

In partnership with

Huawei is at the forefront of the global digital transformation wave, committing significantly to cybersecurity innovation. As the world leans towards digitalization, Huawei is stepping up its game with impressive investments and cutting-edge strategies.

Key highlights from the article include:
Massive R&D Investment: In 2024, Huawei allocated $24.6 billion to research and development, which is 20.8% of its annual revenue.
Cybersecurity Focus: Over 3,000 experts are dedicated to cybersecurity, with a long track record of zero major incidents in over 170 countries.
AI Integration: AI-driven network attacks surged by 50% in 2024, prompting Huawei to enhance its defenses with AI capabilities.
Innovative Ransomware Solutions: The company introduced multi-layer protection, achieving 99.9% detection rates for ransomware.

With these initiatives, Huawei is proving that proactive cybersecurity is essential in today’s AI-driven landscape, ensuring safety and privacy for a digital world.

Stay up-to-date with AI

The Rundown is the most trusted AI newsletter in the world, with 1,000,000+ readers and exclusive interviews with AI leaders like Mark Zuckerberg, Demis Hassibis, Mustafa Suleyman, and more.

Their expert research team spends all day learning what’s new in AI and talking with industry experts, then distills the most important developments into one free email every morning.

Plus, complete the quiz after signing up and they’ll recommend the best AI tools, guides, and courses – tailored to your needs.

In today's digital landscape, quantifying cybersecurity investments is crucial for business leaders aiming to protect their assets and demonstrate value. Here’s how to transform cybersecurity spending into a strategic advantage:

Recognize Cyber Risks: Frame cyber threats as financial risks to highlight potential operational disruptions and compliance costs.
Align Investments with Goals: Map initiatives to key business objectives, particularly those affecting customer trust and revenue.
Calculate ROI: Utilize tools to assess potential losses from breaches against investment costs, making the financial case for security measures clear.
Employ Risk-Based Metrics: Identify critical risks and their financial implications, tracking how investments mitigate these risks over time.

By focusing on these strategies, leaders can turn cybersecurity into a measurable asset rather than a mere expense, ensuring informed decision-making and fostering collaboration across departments. Proactively managing cybersecurity builds trust and safeguards organizational growth, ultimately transforming it into a competitive edge.

Blockchain technology is transforming the landscape of cybersecurity in exciting and innovative ways, marrying itself with advancements in quantum computing for even greater impact. Here’s a quick rundown of its groundbreaking applications:

Secure Digital Identity Management: Offers users control over credentials, reducing fraud and identity theft risks.
Integrity in Critical Data Management: Ensures accuracy in sensitive sectors like healthcare and finance, thanks to immutable, auditable histories.
Distributed Networks: Eliminates single points of failure, enhancing resilience against cyberattacks with advanced cryptography and smart contracts.
Collective Intelligence Against Threats: Facilitates real-time information sharing among experts to better anticipate and respond to cyber challenges.
IoT Security: Guarantees data integrity across interconnected devices while automatically managing security processes.

Despite challenges like scalability and interoperability, blockchain presents a robust foundation for the future of digital security, ensuring safer online experiences for all.

In the dynamic world of cybersecurity, blind spots among workforce practices are becoming a hacker’s playground. Serge-Olivier Paquette, Chief Product Officer at Flare, sheds light on these vulnerabilities that attackers are cleverly exploiting. Key insights include:

Underestimating Threats: Personal device usage and shadow IT create unexpected weak links.
Disconnected Departments: Non-IT teams lack timely threat updates, creating windows for attackers.
AI-Driven Attacks Rising: 87% of organizations experienced breaches due to AI-related threats.
Outdated Security Frameworks: Compliance measures lag behind the evolving landscape of multi-cloud and hybrid environments.

As remote and hybrid work grows, the importance of proactive identification of vulnerabilities has never been clearer. Security teams must shift from reactive strategies to a unified approach that embraces continuous threat hunting to stay ahead of increasingly sophisticated adversaries. Understanding and closing these blind spots is essential to fortifying defenses against today’s cyber risks.

As the Cybersecurity Information Sharing Act (CISA) approaches its sunset on September 30, 2025, experts stress the importance of reauthorization to bolster cybersecurity practices.

Key takeaways include:
Foundation of Information Sharing: CISA facilitates vital communication between private companies and government, enhancing cybersecurity defenses.
Current Challenges: Information sharing between the private sector and government has declined, raising cyber risks.
Opportunity for Improvement: There's momentum for updates to broaden definitions and protections, ensuring effective information exchange.
Congressional Interest: Many lawmakers recognize the importance of CISA’s foundation and the need for timely reauthorization.

With discussions already underway, stakeholders are urged to voice their support, emphasizing CISA’s critical role in addressing evolving cybersecurity challenges. If not reauthorized, key protections may lapse, exposing vulnerabilities in an increasingly interconnected digital landscape. The time for action is now!