Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

July 2024

The Significance of the Number 42 in the New ISO AI Standard

The number 42 has gained legendary status in popular culture, largely due to Douglas Adams’ science fiction series, The Hitchhiker’s Guide to the Galaxy. In this series, a group of hyper-intelligent beings build a supercomputer named Deep Thought to calculate the “Answer to the Ultimate Question of Life, the Universe, and Everything”. After much contemplation, Deep Thought reveals the answer to be simply “42”.

Sysdig Customer Care Chronicles - Security Is A Team Sport

For the Sysdig Customer Success team, our mission is simple: ensuring that our customers get the most value from our product. Usually that means helping them use the product, answering questions, and requesting feature enhancements. In our line of work, sometimes you have to throw out the usual playbook to make things happen. This particular story started when we noticed a change in a customer’s agent usage.

Cybersecurity Best Practices for SOX Compliance

The Sarbanes-Oxley Act (SOX), enacted by the United States Congress in 2002, is a landmark piece of legislation that aims to improve transparency, accountability, and integrity in financial reporting and corporate governance. The act was a response to high-profile corporate scandals, such as those involving Enron, WorldCom, and Tyco International, which shook investor confidence and underscored the need for regulatory reforms to prevent corporate fraud and protect investor interests.

Your Cybersecurity Risk Is Higher on July 4

While the Fourth of July is typically considered a day of celebration for those in the U.S., many don’t realize it’s also a period of heightened risk. In fact, this isn’t unique to the Fourth of July: holidays often see an uptick in cybersecurity threats. With the Fourth of July nearly upon us, let’s examine why this happens and how you can protect yourself and your business.

Should You Change Your Password Every 90 Days?

No, you don’t have to change your password every 90 days. This idea of regularly changing your password is known as password rotation. The main benefit of changing your passwords so often is to prevent unauthorized users from accessing private information. For personal accounts, changing your passwords every 90 days can actually end up being worse than keeping them the same.

Google Authenticator vs Keeper

An authenticator app is a method of Multi-Factor Authentication (MFA) that adds an extra layer of security to your online accounts. Keeper can be used in place of Google Authenticator as it stores, generates and automatically fills your authentication code along with your login credentials. Continue reading to learn about the downsides of Google Authenticator and why Keeper Password Manager is the better choice.

Can My iPhone Get a Virus?

Yes, your iPhone can get viruses. However, it is uncommon for iPhones to get viruses due to the nature of Apple’s iPhone Operating System (iOS). Because iPhone users are only able to download apps from the App Store, this makes it much harder for hackers to infect their devices. Having a jailbroken iPhone would make you more susceptible to getting infected with viruses because you could download unauthorized apps outside of the App Store.

Navigating Security Challenges in Hybrid Infrastructure

As organizations increasingly adopt a mix of cloud-based and on-premises systems, they face unique challenges in securing their hybrid infrastructures. Unlike traditional IT setups, where everything is managed within the confines of a single data center, hybrid infrastructures combine the agility of the cloud with the control of on-premises systems. While this blend offers flexibility and scalability, it also introduces security complexity and a broader attack surface.

Top 4 Most Common Cyberthreats to Organizations

In today's digital age, where cyberattacks are multiplying rapidly, understanding the threat landscape is essential for the survival of organizations. It is clear that cybercriminals are not resting on their laurels and are constantly developing new strategies. This forces businesses to stay ahead of the curve to protect their digital assets. Companies need to be aware of the most common cybersecurity threats and the appropriate protection measures to ensure the security of their sensitive information.