Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

The State of Data Security in 2022: The CISOs Perspective

In the two years proceeding from the beginning of the COVID-19 pandemic, the business world has been transformed on a grand scale. Organizations have created more data than ever before, data is now spread across a wider attack surface, putting it at a heightened risk of becoming a compromised risk. The manner and location of data storage and correspondence has had to shift to meet the needs of remote and hybrid workers, with companies being forced to take a more rigorous approach to data security.

How should the security industry innovate against email risks over the next five years?

Our research has revealed that 80% of security professionals have experienced increased security threats since shifting to remote work. To stay protected against attacks and reduce the chances of losing significant amounts of money, putting their users at risk, or destroying their reputation, organizations must do more to innovate against email risks. In our most recent report, Cybersecurity experts' views on email risk within Microsoft 365, we identify many of the risks Microsoft 365 users face.

Nightfall's New Console Provides Actionable Analytics & Centralized UI for Solving Data Security Risk

The Nightfall platform is a SaaS data protection platform already known for its high accuracy findings and analytics. Now, thanks to new features baked into the Nightfall Console, users will have enhanced analytics functionality through an elegant and easy to navigate dashboard interface. Watch the video demo below for a walkthrough of changes, or read the rest of the post to learn more.

How to Secure and Protect Your Kubernetes Cluster?

Kubernetes is the de-facto container management platform of today and the future. It has increased the scalability and flexibility of applications and eliminated vendor lock-in. Kubernetes also brings a lot of security native features; however, with security, the devil is always in the details. By default, the security of cloud services, applications, and infrastructure is not in the scope of Kubernetes. This does not mean that running Kubernetes is destructive and makes your applications vulnerable.

Cybersecurity in city government, taken to new heights: An Interview with Shane McDaniel

When most people speak of any city government, they often mention words like “Bureaucratic”,“Behind the times”, and “Slow.” This is especially true when considering cybersecurity initiatives. However, a small town in Texas is changing that view. Seguin, Texas, which was once the smallest Texas city to have a full-time cybersecurity employee, was the only government entity to be named in the CSO50 2022 Awards.

HIPAA for Dummies: The Ultimate HIPAA Security and Compliance FAQ

Building a HIPAA-compliant security program is a very time intensive and demanding undertaking. It can also be confusing, as satisfying requirements like the HIPAA Security Rule require extensive interpretation and documentation on the part of security professionals. However, by arming yourself with knowledge before beginning the process, you can cut down on unnecessary difficulties.

Does Cybersecurity Require Coding?

While cybersecurity is deeply rooted in the tech and digital space, you might be surprised to find that many cybersecurity jobs don’t require coding or programming skills. Cybersecurity professionals can find careers with both technical and non-technical backgrounds. To succeed in the field of cybersecurity, it’s far more important to be analytical, solutions-driven, and well-versed with technology.

Nightfall vs. BetterCloud: Looking for a BetterCloud alternative?

By one estimate, the average company has a whopping 254 SaaS apps (with enterprises averaging 364 apps). Employees may not be using all 250+ SaaS platforms regularly; this leaves dozens of apps with unchecked access to the business’ IT environment — a big security risk. Tools like Nightfall and BetterCloud aim to reduce this potential risk in different ways.

Cybersecurity compliance: Time to clean up the cobwebs

Cybersecurity compliance became prominent in the last decade. From being a trivial part of an organization’s business strategy in the early years to being a core objective now, cybersecurity compliance has come a long way. Today, organizations have dedicated teams and personnel, such as chief compliance officers, to ensure that they stay compliant with the relevant standards pertaining to their industry and location. It is essential for organizations to stay updated to avoid sanctions.

Special Category Data GDPR (General Data Protection Act)

The General Data Protection Regulation is a data privacy law that protects the privacy of people of citizens of the EU and UK. The regulation is designed to protect the rights of individuals and also ensure the privacy of their personal data. The regulation outlines a detailed set of requirements for organizations collecting, storing, and managing personal data.