Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How to Perform a Cybersecurity Audit for Colleges & Universities

‍Cybersecurity audits are essential for any organization to review, analyze, and update its current IT infrastructure, information security policies (ISP), and overall cybersecurity risk management protocols. Audits are a critical part of information security and should be performed annually to ensure that new policies are implemented properly, potential vulnerabilities are identified, and the school maintains compliance with regulatory standards.

Guide to the best data privacy certifications for 2022

According to research by Statista, over 80% of internet users in the US fear that their personal information is vulnerable to hackers. Data privacy defines how organizations and other entities collect data on other individuals, how they process it, for what purposes they collect and process it, how long they keep it, and how they protect it, to name a few. In the modern digital environment, data privacy certifications are essential since they impart the skills needed to become privacy specialists.

The risks of coworking and how MSPs can help eliminate them

A coworking space, or communal workspace, enables professionals from different companies and industries to share the same office environment. These spaces first became popular among freelance workers, then became the preferred workplace for start-ups, but now, since the hybrid work model has become part of everyday life, companies planning to downsize or close offices see these places as their new workspace.

Beyond Data Episode 2: Vehicle Autonomy; the good, the bad, and the complicated

In our second Beyond Data podcast episode ‘Autonomous mass transportation and its impact on citizen privacy’, we will sit down with Beep’s Chief Technology Officer, Clayton Tino to explore the current landscape of autonomous vehicles (AVs), whether AVs truly can replace the human factor in public transportation, and how AV ethics can be holistically measured. Here we give you a snapshot of that fascinating discussion by digging into a few of the explored topics.

GDPR Privacy Notice

GDPR Regulation is an international Data Privacy law that upholds the rights of citizens of the EU. It gives citizens more control over how their data is used in the organization. If your company handles the personal information of people in the EU, then they are expected to comply with GDPR. Like any other regulation, GDPR too requires an organization to abide by the rules and requirements outlined in the law.

Free and Protect Kubernetes Data with CloudCasa and Ondat

The adoption of Kubernetes and its ecosystem has continued its rapid growth, with over 5.1 million developers worldwide now using Kubernetes. Developers are adopting and utilizing Kubernetes to manage containerized workloads and services. Kubernetes has many benefits for organizations and developers including auto scaling, automated deployment and rollback, self-healing, loading balancing and application centricity.

Why CISOs are the new champions of insurance transformation

The insurance industry's business model is rapidly evolving as the latest consumer and business technologies deliver greater quantities of real-time data than ever before. McKinsey predicts that by 2030, processes like underwriting as we know it will cease to exist — machine and deep learning models will automate policies and reduce delivery time to seconds.

Trustwave Named Rising Star in 2022 ISG Provider Lens Quadrant Report on Cybersecurity Solutions & Services

ISG recognized Trustwave as a Rising Star in Managed Security Services for Large Accounts in its recently released Provider Lens™ Quadrant Report on Cybersecurity Solutions & Services report. The ISG research evaluates strengths, challenges, and competitive differentiators across cybersecurity providers and solutions, and serves as a resource for IT decision makers tasked with improving the cyber resilience of their organizations.

Netskope Announces General Availability of Endpoint DLP, Further Expanding Its Data Protection Platform

Today we are proud to announce general availability of our patented cloud-based endpoint data loss prevention (DLP) solution. The release of endpoint DLP expands the already comprehensive Netskope DLP platform and represents a major milestone in data protection, as it enables customers to protect data anywhere, across their hybrid enterprise ecosystem and in the cloud. Let’s look at why this is so important.

CVE-2022-36085, OPA and Styra DAS

Testing the relatively new function mocking feature of OPA revealed a vulnerability in the Go API, where the use of the WithUnsafeBuiltins function on the compiler object — a deprecated legacy function used to declare a set of function names as unsafe, and as such rejected in the policy compilation stage — could be bypassed by mocking a function, effectively replacing it with one of the functions deemed unsafe.