Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

February 2024

What Can Someone Do With Your Social Security Number?

If someone steals your Social Security number, they can use it to open bank accounts under your name, steal your benefits, file your tax return and commit other types of fraud. Your Social Security number is tied to your identity in the U.S. Without it, you are unable to identify yourself to receive employment and benefits. A threat actor can use your Social Security number for malicious purposes such as stealing your benefits or committing crimes under your name.

Relative Maintenance Windows - Patch FAQs - Tanium Tech Talks #80

See how to automatically download and deploy patches to your own pre-defined patch rings in today's Patch FAQ, using the new relative maintenance windows feature. Set-it-and-forget-it! This is the trifecta of zero-touch patching: relative maintenance windows, relative patch lists, and on-going deployments. Combine that with dynamic computer groups via tags or randomization for the ultimate experience of patch automation for #Windows and #Linux.

Arctic Wolf's 24x7 Monitoring Secures Parramatta's Fans and Members Valuable Data

As two of the most recognizable brands in Western Sydney, Parramatta Eels and Parramatta Leagues Club know that cyber threats are always lurking. Thanks to a comprehensive partnership with Arctic Wolf, the club is able to to focus on a full digital transformation to become a club of the future, providing fans and members with customized experiences while expanding the breadth and depth of their cybersecurity.

Creating DataTrails for Supply Chain Artifacts

In a world where software is produced, distributed, and re-distributed, how do you ensure the software you consume is authentic and safe for your environment? How do you know the software you deployed yesterday is safe today? Most software exploits are discovered after the software has been deployed, which raises the question: It’s not just about getting software updates, as the majority of exploits are distributed as updates. Staying updated isn’t the most secure.

Cost-Effective Disaster Recovery for Wasabi and Veeam

In the IT industry, downtime is typically estimated at approximately $5,600 per minute, posing a significant threat to revenue, customer trust, and compliance. For SMBs, safeguarding data and ensuring business continuity are paramount for survival and competitiveness. A robust disaster recovery (DR) solution not only protects against threats like cyberattacks and hardware failures but also minimizes downtime, demonstrating reliability to customers and partners.

Product Quality at Rubrik - Part 2

In our previous blog, we discussed the importance of product quality, different types of testing we rely on at Rubrik, and how automated testing plays a pivotal role in ensuring quality of our products. Relying heavily on Unit, Component and Integration testing is important. But there will be code paths which we may not be able to cover using these types of tests. In the picture below, we can see a high-level view of our solution.

Can National Awareness Days Help Shift Attitudes To Internet Safety?

February brings a flurry of cybersecurity awareness days. On February 1st, Change Your Password Day reminded us that using “Rover123!” for yet another online account is not an appropriate defence between ourselves and cyber criminals, while yesterday—Safer Internet Day—encouraged us to take positive steps toward protecting ourselves online. But how long do these positive reminders last?

KuppingerCole Names Sysdig a Product and Innovation Leader for CNAPP

The cloud security market is still maturing and growing at a rapid pace. New security jargon, solutions, vendors, and acronyms are constantly appearing, making it difficult to have a clear sense of what approach to cloud security is best for your own organization. Cloud-native application platforms (CNAPPs) are one of the most recent categories in this space.