Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

What is Common Vulnerability Scoring System (CVSS)?

Given the large and growing number of cyber attacks that exploit software vulnerabilities, vulnerability management is critical. A variety of unintended consequences can result from misjudging the severity of an existing vulnerability. Legal battles, financial losses, and reputational damage are all possible outcomes for a business. To combat today's modern cyber security challenges, it's critical to have a vulnerability management program in place.

The 6 Biggest Cyber Threats for Financial Services in 2021

According to VMware, the first half of 2020 saw a 238% increase in cyberattacks targeting financial institutions. And according to IBM and the Ponemon Institute, the average cost of a data breach in the financial sector in 2021 is $5.72 million. Based on these statistics, if you're in the financial services sector, there's a very high chance that you'll eventually fall victim to a very costly cyberattack.

Corelight & Microsoft Defender for IoT: Through an XDR lens

What is the XDR paradox? It’s the hottest term in security but there is no consensus yet on the right definition. Why is that? Many organizations have deployed EDR and are benefiting from it, but also looking to the gaps that EDR can’t address such as unmanaged / compromised devices or network-centric TTPs. Likewise, many vendors of EDR/SIEM products have realized they have the same general workflow (analyze data, present an alert, triage it, etc).

Lookout CASB Named a Major Player in 2021 IDC MarketScape Cloud Security Gateways

I am excited to share a major milestone for our company: the Lookout Cloud Access Security Broker (CASB) has been named a Major Player in the 2021 IDC MarketScape Worldwide Cloud Security Gateways (CSG) Vendor Assessment (Doc # US48334521, November 2021). When Lookout acquired CipherCloud back in March 2021, the two companies came together with a mission to build a platform that provides intelligent Zero Trust access by leveraging in-depth telemetry from endpoint to cloud.

Remote Work and Cybersecurity in the Legal Industry: What to Know

The COVID-19 pandemic changed many aspects of how businesses operate, remote work being one of the most significant. At the outbreak’s peak, 71% of American workers telecommuted at least part-time, 62% of whom rarely worked remotely before. This shift has impacted many industries, but the legal sector faces more disruption than most. Legal work rarely happened over telecommunication services before the COVID-19 pandemic.

Why you need a layered security approach for protecting your data in today's threat landscape

Data is the lifeblood of any organization, and thanks to digital transformation, data can be shared easily among many users within and across organizations. Organizations store as well as transmit large amounts of sensitive data and information. As more and more data exchange happens, risks and threats also increase. The average cost of a data breach was $ 3.86 million and surprisingly the average time to identify and contain a breach was a staggering 280 days.

3 Trends in eTMF Adoption After COVID-19

The TMF Summit, a clinical documentation management conference hosted by industry observer Fierce Biotech, was held in late October in New Orleans. There was plenty of talk about familiar topics such as data quality and integrity, as well as data submission workflows and monitoring. But what stood out this year was how the pandemic continues to reshape the industry.

Why You Should Build an Agile, Integrated Construction Tech Stack

When it comes to construction technology, one size doesn’t necessarily fit all. Businesses often have different needs that require different tools to automate established processes, or standard operating procedures (SOPs). This creates a problem, however, because decision makers have to sift through the available technologies—and the depth and breadth of what processes they can cover—to find the right solution.

The Secure Data Layer: A Formidable Opponent Against Ransomware

When organizations are attacked by ransomware, only a little more than half are able to recover their data using a backup. This begs the question, “What about the rest? Why might they be unable to recover?” One reason may be that their backup data has been compromised. Backups are a hot target for hackers. If they can get to an organization’s backup data, they have far more leverage.