Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

March 2024

What is an SSL Certificate?

An SSL certificate enables an encrypted rather than a plain-text connection and verifies websites are secure. It stands for Secure Sockets Layer and creates an encrypted link between the server on which a site is hosted and the visitors' browsers. SSL certificates allow websites to use HTTPS, the more secure version of HTTP. The website's origin server hosts the SSL certificate, which is a data file. SSL certificates enable SSL/TLS encryption and contain the website's public key.

Mend.io Launches Mend AI

Securing AI is a top cybersecurity priority and concern for governments and businesses alike. Developers have easy access to pre-trained AI models through platforms like Hugging Face and to AI-generated functions and programs through large language models (LLMs) like GitHub Co-Pilot. This access has spurred developers to create innovative software at an enormously fast pace.

CrowdStrike to Acquire Flow Security, Sets the Standard for Modern Cloud Data Security

I’m thrilled to announce CrowdStrike’s agreement to acquire Flow Security, a pioneer in data security posture management (DSPM) and the industry’s first and only cloud data runtime security solution. With this acquisition, CrowdStrike is setting the standard for modern cloud security with complete real-time data protection spanning endpoint and cloud environments, delivering the only cloud data protection platform that secures data both at rest and in motion.

Does Your MDR Deliver Outcomes - or Homework?

At CrowdStrike, we’re on a very simple mission: We stop breaches. It’s easy for us to make this claim but challenging to put into practice and maintain day in and day out. Still, we know with absolute confidence that nobody provides managed detection and response (MDR) better than our CrowdStrike Falcon® Complete MDR team. Why? Because we prioritize outcomes above all else, and we never leave customers stranded with extra work.

How to Prevent Brute Force Attacks

A brute-force attack is a trial-and-error method hackers use to guess login information, and encryption keys, or find hidden web pages. In a brute force attack, an attacker tries as many combinations as possible, systematically incrementing through all possibilities until the correct password is discovered. This can be done manually, but it is usually automated using specialized software tools designed for this purpose.

Clarifying Roles and Responsibilities in GRC Management

Governance, risk management, and compliance (GRC) are crucial activities for any modern organization. Implementing an effective GRC program, however, is easier said than done. The first and most critical step: defining clear roles and responsibilities so people know what they’re supposed to do to further your GRC A well-structured GRC team facilitates collaboration across departments, leverages cross-functional expertise, and drives consistency in managing governance, risk, and compliance.

The Top GRC Software of 2024: Expert Reviews & Comparisons

In today’s complex cybersecurity environment, the need for robust governance, risk management, and compliance (GRC) strategies has never been higher. With evolving regulations, heightened security threats, and complex compliance requirements, organizations are turning to GRC software so that they can meet their objectives efficiently and effectively. That said, your choices for GRC software are many.

The Pros and Cons of Using Passphrases

Some of the benefits of using passphrases are that they’re easy to remember, difficult for cybercriminals to crack and they’re considered to be more secure than traditional passwords because of poor password habits. Some of the disadvantages of using passphrases are that some websites and apps may have low character limits, it’s impossible to remember passphrases for every single one of your accounts and they’re still vulnerable to being exposed in public data breaches.

Making Sense of the SEC's New Rules for Cybersecurity Risk and Disclosure (Part I)

As the digital age unfolds, we continue to see seismic increases — decade-to-decade, year-to-year, and even month-to-month — in the amount of data we create as well as its value to us, both individually and collectively. From medical records, financial statements, and classified government documents to transactional processing systems, customer information, social media engagements, pictures of our pets, and so much more, data is the lifeblood of modern society.