Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

February 2024

Retirement & Life Insurance Provider Responds to Application Disruptions

Infosys McCamish Systems (IMS) is a subsidiary of Infosys, a global outsourcing organization. IMS is primarily concerned with delivering life insurance and retirement solutions for clients of Infosys. Among those who use IMS’ services are nationwide organizations, including Bank of America. In November 2023, IMS was made aware of a cyberattack on their systems; the attack disrupted some of IMS’ applications and compromised the information of 57,028 people.

2024 Predictions from Teleport CEO Ev Kontsevoy

In 2024, I hope to see significant growth and renewed optimism in the tech sector. Personally, I’m looking forward to the year ahead with positivity as Teleport enters an important period and a packed pipeline of significant enhancements to the platform. These capabilities are increasingly critical to a threat landscape that is centered on attacking identity and exploiting human behavior.

How a Managed Detection and Response Provider's Global Footprint Helps Defend Against Cyber Threats

Cyber threats can originate from anywhere around the globe. For services such as managed detection and response (MDR) to effectively defend against them requires a managed security service provider (MSSP) that likewise has a global footprint. The top 10 countries from which distributed denial-of-service attacks (DDoS) originate include China, Brazil, India, Indonesia, Russia, and Germany, according to data collected by the cloud services company Cloudflare. At the same time, the U.S.

Guest Blog: Bolstering Medical Cybersecurity - How ZTNA Platforms Stand as Guardians

A guest blog, written by Jaye Tilson, Field CTO at HPE Aruba. The healthcare industry, the very lifeline entrusted with safeguarding our most sensitive data, is under relentless attack. Cybercriminals see medical records, financial information, and even critical patient monitoring data as their golden goose, with breaches inflicting unimaginable harm. In this ever-evolving threat landscape, healthcare companies must prioritize building robust cybersecurity strategies.

Critical Windows Event IDs to Monitor

Like most organizations, your company likely invested in various Microsoft products. The Microsoft ecosystem provides businesses with nearly every kind of technology necessary, from workstation operating systems to Azure to Windows 365 that includes cloud-native versions of their traditional Office tools and the communication platform Teams. However, attackers are just as invested in the Microsoft ecosystem.

Verizon Employee Data Compromised

Verizon is a top-performing communications organization with clients and influence worldwide. They offer various electronic services, including physical technology, Internet services, entertainment programs, communications plans, etc. They enjoy a user base of nearly 145 million people in the US, making them the largest telecoms operator in the states. Verizon recently announced a breach in mid-September 2023; however, the event was not from an external threat actor—it came from an employee.

Introducing the SecOps Cloud Platform

Gone are the days of one-size-fits-all security solutions that do not adequately address the complexities of modern networks and evolving threats. These general-purpose tools lack the flexibility to adapt to your unique environment and specific needs. As a result, organizations end up with a fragmented collection of tools that need to be manually integrated and stitched together, leading to inefficiencies, gaps in security coverage, and extreme costs.

Egnyte + Google Cloud

Secure sensitive data amid a frictionless collaboration experience with Egnyte and Google Cloud. Automate discovery, control and protection of data wherever work happens to simplify compliance and security processes. Protect data across multi- and hybrid cloud environments, reduce attack surfaces, and enact better data governance — all from a single control panel.

Adapting to Legislative Demands: Insights on Cyber Security Compliance in Critical Infrastructure

Welcome to Razorwire, the podcast dedicated to exploring the complex and evolving world of cyber security legislation. I'm your host, Jim, and in today's episode, we delve into the intricate landscape of cyber security legislation with our guests Steve Applegate and Phil Tonkin from Dragos.

Container security essentials

As cloud-native applications continue to proliferate, containers are becoming the preferred option to package and deploy these applications because of the agility and scalability they offer. In fact, Gartner predicts that 75% of global organizations are running containerized applications in production. The popularity of containers has also attracted hackers looking for new ways to exploit applications.