Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Empower Users to Securely Access and Share Data

If the past several years of technology advancements, pandemic adjustments, and increased cyber threats has taught us anything, it’s that data security and governance are the responsibility of the entire corporate team. Of course, the primary responsibility rests with the executives and the CISO or security team they’ve empowered, but the scope and scale of protecting critical data assets is too large for any single business unit to tackle.

Addressing Insider Risk with Netskope Intelligent SSE

We’d like to think of our coworkers as trusted team members, collaborating on a shared mission to make positive contributions to the well being of the company. For the most part, this is true, but we must also recognize that our coworkers are individuals who may conduct themselves in ways that are detrimental to the company.

Introducing Snyk Training, our online learning platform

Snyk has officially launched Snyk Training, a free online resource to help developers and security teams learn how to implement, configure, and use Snyk on their own. The initial content in Snyk Training focuses on three learning needs: The platform is an easy way for teams to get an introduction to Snyk tools and user best practices. Most courses take between 3 and 10 minutes, and have been described by a customer as, a “very good overview on how to get started with the Snyk journey!”

How to Back Up Your Data: 6 Effective Strategies to Prevent Data Loss

Having a plan to back up your data is one of the most important processes to protect the data in the event of a cyber attack. Should a malware or ransomware attack occur, you can boot a saved backup and restore your data to its previous state. Some organizations might use cloud-based solutions like Google Drive or Dropbox, while others prefer to keep their backups on an external hard drive. However, to ensure total data security, your backup strategy should include multiple solutions.

Using Threat Intelligence To Advance Your Security Posture

People often ask me, “What’s the purpose of cybersecurity?” I tell them that it serves to protect the valuable, intangible data assets of firms or private individuals, usually by trying to shrink the attack surface. One way to achieve cybersecurity is to utilize threat intelligence research in your firm’s security plan. In this article, I will discuss the benefits of understanding and implementing a threat intelligence program.

What is Data Theft? 8 Tips & Tricks to Prevent Losing Your Data

Data theft is a major cybercrime whose growth has been fuelled by rapid digital advancements in recent years. It involves the illegal storage or exfiltration of data or financial information. This can include passwords, algorithms, software code, proprietary technologies, or other sensitive data. To help you better protect your organization against data theft, this article will discuss what data theft is, how it occurs, and how you can prevent it.

8 Ways to Implement an Effective GRC Framework

Governance, Risk, and Compliance (GRC) is a broad organizational strategy that aims to align an entire organization’s focus on the achievement of business objectives, the management of business risks, and regulatory compliance. A solid foundational framework enables your organization to continue strengthening and refining its GRC strategy over time. It ensures each department’s objectives align with the business as a whole.

Supply Chain Cybersecurity - the importance of everyone

This week, I spoke with a new client who told me all about how they are looking forward to addressing a number of internal issues surrounding their IT systems. They explained that over the last 12 months, they repeatedly had issues of delays in service and outages, which had affected their business. Discussing this further, I explored their relationship with the supplier and asked what due diligence they had performed prior to working with them.

AI-Based Planning? You Might Want To Double-Check That Data.

AI is awesome! It can do so much for us, much faster and broader than we can do ourselves. All of AI’s benefits are great, assuming the data is trustworthy. Sure, algorithms can detect and remove outliers, but what if your corrupt data does not reside in the outliers? You can only trust the data when you establish trust at the source of the data. How often have we been conversing with a friend who is relaying information from their friend?

Why Ignorance Isn't Bliss in IoT

Why You Need a Credential Manager For Your Devices Before joining Device Authority, I gave my home IoT security exposure very little thought, and I continued to add to it. Now, I have a plethora of devices in my home including, Smart appliances, Wi-Fi lights and sockets, wireless security video, and Wi-Fi-enabled active home power monitoring, to name a few.