Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Arctic Wolf's Global Survey Reveals Lack of Confidence in Cybersecurity Defenses and Government Action

After a year of high-profile cyberattacks and uncertainty caused by the extended pandemic, Arctic Wolf wanted to understand the impact this period has had on cybersecurity strategy and business overall. In August of this year, we commissioned a survey of over 1,400 senior I.T. decision-makers and business executives in the U.S., U.K., and Canada, and today we are publishing the results.

Everything You Need to Know About the Apple Emergency Software Update

On Tuesday, September 14, Apple announced its latest generation of products along with the major release of iOS 15. Unfortunately, this coincided with an earlier announcement of an emergency software update due to a critical software vulnerability discovered within a series of Apple products. This vulnerability was identified by researchers at Citizen Lab, who found a flaw capable of allowing attackers to install invasive spyware on affected devices without the interaction of the owner.

Why Small and Medium-Sized Businesses Shouldn't Build Their Own SOC

When smaller firms are hit by a cyberattack, the cost can be devastating. One out of four businesses with 50 or fewer employers report paying at least $10,000 to resolve an attack. And for organizations with fewer than 500 employees, insider incidents alone cost an average of $7.68 million, according to the Ponemon Institute's 2020 Cost of Insider Threats report.

Discover How the Arctic Wolf Platform Facilitates HIPAA Compliance

For healthcare organizations, cybersecurity isn’t just about staying safe and protected from evolving cyber threats—it’s also about staying compliant. The most well-known healthcare regulation of them all is the Health Insurance Portability and Accountability Act (HIPAA), which recently celebrated 25 years on the books.

A Cybersecurity Checklist for Monitoring SaaS Applications

Today’s digital perimeters grant authorized users anytime/anywhere access to sensitive business data. Because of this, SaaS-heavy IT environments introduce a higher complexity to threat detection and response efforts. User activity on SaaS accounts can be quite varied, occurring on multiple endpoints and from a variety of locations. Businesses must distinguish between legitimate and potentially illicit user activity on busy networks.