Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Is it possible to shift on-premises Active Directory to the cloud with AWS Managed Microsoft Active Directory?

I’ve seen this question bouncing about in different forums for quite some time now. I haven’t seen any definitive answers because it always depends on the organization’s use of AD. Recently, I noticed something called AWS Managed Microsoft Active Directory. I must admit, six months ago I was not aware of AWS Managed Microsoft Active Directory, but when I started looking into this cloud-based AD solution, some connections started coming together.

LockBit Takedown: Law Enforcement Disrupts Operations, but Ransomware Threats Likely to Persist

The news that US, UK, and other international law enforcement agencies disrupted LockBit is welcome, as stopping any threat group activity is always a positive. The unfortunate aspect is this blow won’t impact ransomware overall. As in the past, another group will pick up the slack, or LockBit itself will reform and get back into business.

2024's Top GRC Solutions: Finding the Best for Your Business

Implementing an effective governance, risk, and compliance (GRC) framework has become essential for businesses seeking to manage risk and assure regulatory compliance. That’s easier said than done, unfortunately. Given today’s challenging regulatory and security environments, organizations need robust GRC capabilities to align governance, risk, and compliance activities. The key is finding the right GRC platform to meet your specific GRC needs.

Troubleshooting Vulnerability Scan Failures: A Quick Guide

In the digital age, assuring the security and integrity of IT infrastructure is paramount for businesses of all sizes. Vulnerability scanning plays a crucial role in identifying weaknesses in systems and networks, and forms the backbone of any robust cybersecurity strategy. What happens, however, when this critical step fails or encounters issues?

The Cure For Security Alert Fatigue Syndrome

Most security tools waste developers’ time. We’re on a mission to fix this. Application Developers aren't paid to care about security. Their performance is measured by the speed at which they can add value to the business through new features or enhancements. This makes traditional security tools a hindrance as they're not built for developers — plus, they're not designed to be helpful.

Cementitious Vendor-CGM-Network Compromised by 315k Data Breach

Based in Philadelphia, Pennsylvania, CGM is a nationwide cementitious vendor for industries and construction projects. They are a leader in manufacturing, labeling, and distributing custom cement and patching products. CGM also offers solutions for dry cementitious powders, construction liquids, and options for epoxy resins. At their physical facility, they process and package concrete construction products for their vast range of clients.

Navigating complexity in AppSec

Even as the speed of software development increases, security remains a paramount concern. As organizations strive to keep pace with rapid innovation, they grapple with the dual challenge of maintaining agility while ensuring the security of their software products. Enter AppSec on the Move 2024, a pivotal event that promises to shed light on strategies for improving the return on investment (ROI) of application security (AppSec).

Navigating the Intersection of Delegation and Authorization

In the complex world of information management and system administration, two fundamental concepts – delegation and authorization – often intersect to determine how permissions, responsibilities and security are handled. In this blog post, we'll explore the intriguing interplay between delegation and authorization and how they work together to ensure efficient access and secure operations. Delegation: Sharing Responsibility.

WSUS : Windows Server Update Services (WSUS) installation on Windows Server 2022 - Part 2

In the previous article, we covered some fundamental information you should know before installing WSUS in your infrastructure. Just to refresh your memory, WSUS stands for Windows Server Update Service, and it is used for the centralized update and reporting of Microsoft-based products. This includes Windows, Windows Servers, Exchange, SQL, SharePoint, and others.

Microsoft Azure Administrator: AZ-104 : Managing Azure Subscriptions - Part 17

In addition to managing other aspects of the Azure environment, admins must manage their Azure subscriptions. It is also necessary to understand how to manage your subscriptions for the purposes of the AZ-104 exam. This guide will explore AZ-104 managing subscriptions and the tools used to do this.