Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Critical Vulnerabilities Uncovered: How Bitsight Delivered Fast, Actionable Insights in Under 24 Hours

The speed at which vulnerabilities are detected and addressed can drastically impact an organization’s likelihood of suffering a security incident. Recently, Bitsight demonstrated how its investments in product fingerprinting and CVE mapping allowed it to identify and surface assets potentially impacted by a set of critical vulnerabilities in the CUPS printing system in under 24 hours.

The Growing Threat Of Fake Job Applicants

It cannot be denied that the rise of remote work has opened up many opportunities for both employers and job seekers. Despite this, however, it has also presented a plethora of challenges when it comes to recruiting in the cybersecurity and tech spaces, one of the most notable of which is the proliferation of candidates who either don’t exist entirely or who aren’t who they claim to be.

10 Essential Guidelines For Enterprise-Ready AI Solutions

AI-powered solutions are becoming increasingly prevalent in enterprise environments, leading to a new trend in procurement: the need for comprehensive AI governance frameworks. This shift reflects a growing awareness of AI-specific risks and the need for more granular controls. As the founder of Nightfall AI, a startup building AI models for data security, I've navigated hundreds of procurement cycles and observed a rise in AI-specific requirements.

Data Security Best Practices for Cloud CRM Systems as Adoption Surges

For the past few years, the CRM market has witnessed steady growth and it is projected to reach $89 billion by 2024. Estimates are that this growth will continue into the foreseeable future. Essentially, CRM systems have come to stay and have become the backbone of many organizations. However, the bleak state of cybersecurity cuts across many industries, and CRM systems are equally vulnerable.

How the U.S. Department of Justice Can Improve Its Approach to Combat Ransomware Attacks

Earlier this month, the U.S. Department of Justice’s Office of the Inspector General released a report on how the Department could improve its approach to combat ransomware attacks. The report included an audit and evaluated the Department’s strategy to respond and counter ransomware attacks during a two-and-a-half-year period from April 2021 through September 2023.

Mastering Data Masking: Key Strategies for Handling Large-Scale Data Volumes

Masking large volumes of data isn’t just a bigger version of small-scale masking—it’s exponentially more complex. High-volume data masking introduces unique engineering challenges that demand careful balancing of performance, integration, accuracy, and infrastructure costs. In this blog, we’ll dive into the critical factors you must consider when choosing the right tool for large-scale data masking, helping you confidently navigate these complexities.

How To Ensure Data Integrity

You can ensure data integrity in your organization by enabling data encryption, investing in a password manager, regularly backing up your data and implementing strict access controls. Data integrity ensures that your data is accurate and complete, meaning it hasn’t been changed, removed or stolen by an unauthorized user. Continue reading to learn why data integrity is important and how your organization can ensure your data is accurate, complete and consistent.

Why the disaster recovery strategy my company has always used may not be enough.

Is my organization’s disaster recovery strategy ready for today’s uncertain cyber landscape? Your company has determined the recovery point objectives (RPOs) and recovery time objectives (RTOs) for all systems. You have also implemented solutions to achieve these goals. Your organization routinely performs successful Disaster Recovery (DR) tests meeting your established expectations and objectives.

Is IAM, SIEM, and DLP Enough to Combat Insider Risk?

Despite significant investments in cybersecurity tools like Identity and Access Management (IAM), Security Information and Event Management (SIEM), and Data Loss Prevention (DLP), insider risks continue to grow. Why? These tools primarily focus on actions, logs, and event recognition rather than taking a deep, sophisticated approach to understanding human behavior over time. Insider threats—whether from negligence, malicious intent, or compromised users—are notoriously difficult to detect.

Rubrik powers Okta with critical user context to safeguard against identity attacks

Identity-based cyber attacks continue to prevail and impact organizations. Stealing credentials was the top initial action in breaches, according to Verizon. Plus, 84% of identity stakeholders surveyed said identity-related incidents directly impacted their business, resulting in reputational damages, distraction from core business, and increased recovery costs.