Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Improving Energy Efficiency and Resource Allocation with Advanced Facility Management Software

In an era where sustainability and cost-efficiency are paramount, organizations across industries are seeking innovative ways to optimize their operations. One powerful tool that has emerged as a game-changer in this quest is advanced facility management software. This technology is revolutionizing how businesses manage their physical assets, allocate resources, and improve energy efficiency. Let's explore how cutting-edge facility management solutions are driving significant improvements in these critical areas.

OpenSCAP Hardening Guide in 2024

The OpenSCAP (Security Content Automation Protocol) project offers an extensive range of hardening guides, configuration baselines, and tools for assessing vulnerabilities and configuration issues, utilizing SCAP as the protocol for storing the foundational data. Created by the open-source community, OpenSCAP hardening allows a selection of a security policy that aligns with an organization’s needs, irrespective of its size.

Nightfall AI selected as 2024 SC Awards Finalist

Nightfall AI has been recognized as a 2024 SC Award finalist in the Trust Award categories for Best Data Security Solution and Best Insider Threat Solution. Celebrating its 27th year, the SC Awards recognize the solutions, organizations, and individuals that have demonstrated exceptional achievement in advancing information security.

How to Prevent Malware Attacks from Impacting Your Business

A robust malware prevention and detection strategy is critical to cyber security and cyber resilience today. After all, a single malware infection can inflict serious financial damage — from business disruptions and remediation costs to lasting reputational damage and customer churn. To help, this blog explains the types of malware organizations need to defend against and the common vectors for deployment.

On-Prem and Kubernetes: A delicate relationship

In cloud security, context is everything. In the previous two installments of our Customers Care Chronicles, we wrote about how a security vendor needs to be a true business partner and the potential headaches when migrating tools in the cloud. In this installment, we tackle another non-security concept that happens to be crucial for security: environment.

Evolution of Attack Surface Management

While it was not called ASM, the concept of managing attack surface management began with basic asset management practices in the late 1990s and early 2000s. Organizations focused on keeping an inventory of their digital assets, such as servers, desktops, and network devices. The primary objective was to maintain an accurate record of these assets to ensure proper configuration and patch management.

Best Practices for Creating Strong Passwords You'll Remember

Making sure your password is strong yet memorable can be challenging and stressful. However, following best practices – like using passphrases, incorporating acronyms and relying on a password manager – will ensure your passwords are strong and safe. A strong password should contain at least 16 characters, with a combination of uppercase and lowercase letters, numbers and symbols.

The Downloadable Risk Assessment Template for Cybersecurity [XLS]

Every day, new headlines emerge about another major corporation falling victim to a cyberattack, leaving businesses everywhere questioning their vulnerabilities. These breaches underscore the critical need for thorough risk assessments to identify and mitigate potential weaknesses. Proactively managing risks enables organizations to better defend against the relentless wave of cyber threats.

How Frequently Should We Run a Vulnerability Scan?

All it takes is a single unpatched vulnerability to breach security and gain access to a company’s mission-critical assets. Effective vulnerability management is essential for strong cybersecurity. Vulnerability scans play a key role in this process, offering a clear view of the entire IT infrastructure and identifying existing vulnerabilities. How many times should we run scans? Are we scanning often enough? These are the questions we often get.

Understanding OWASP Top 10 Client-Side Risks

Websites rely heavily on client-side code to deliver interactive user experiences. Unlike server-side code, which is protected within an organization’s infrastructure, client-side code runs in the user’s browser and is exposed to various risks such as data theft and JS injection. Recognizing the unique challenges of securing client-side code, OWASP has created a dedicated Top 10 list for client-side security risks.