Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

What is Data Hygiene and Why Is It Important

Many organizations are already cashing in on the promise of big data, hailed as the world’s most valuable resource. However, this crude resource requires refining in the form of data hygiene. Data errors and inconsistencies cost companies millions of dollars a year. Businesses that aren’t able to implement the tools, strategies, and training required often find big data to be more of an obstacle than an advantage.

Observations and Hot Topics from Black Hat USA 2022 and DEF CON 30

Now that Black Hat USA 2022 and DEF CON 30 are over, it is time to reflect on the security industry nicknamed “Summer Camp”, and the week that was in Las Vegas. We had a number of Netskopers from across different teams on the ground and in-person attending the conferences. Like with any large conferences, there were likely many folks who weren’t able to make it out to Las Vegas this year for myriad reasons.

Kerberos Explained

In Greek mythology, Kerberos is a multi-headed dog that guards the gates of the underworld. The Kerberos meaning in technology is analogous: Kerberos is an authentication protocol guards the network by enabling systems and users to prove their identity to one another before access to resources is granted. Read on to learn how Kerberos authentication works and get valuable tips for avoiding issues.

Crypto and phishing - how criminals are cashing in

Over the past several years, crypto has become increasingly mainstream. Research has predicted that by the end of 2022, the number of US adults who own at least one cryptocurrency will increase by 19% to 33.7 million. This equates to 12.8% of the population. Naturally, cybercriminals have quickly learned how to cash in on this popularity.

Protecting the Modern Healthcare Industry Requires Human Expertise and Innovative Partnerships

Protecting healthcare-related data requires a special level of technological and human support where the two support and interact with each other in harmony. Trustwave delivers this protection through its integration with Microsoft Azure Sentinel Security Information and Event Management (SIEM) solution allowing healthcare organizations to focus on caring for their patients while we protect their environment.

The One-Stop Kubernetes Security Checklist

Securing your Kubernetes environments may seem daunting at first, given how many different parts must be individually protected. Still, with the proper organization, you can make Kubernetes security much simpler and more effective. We’ve put together a complete Kubernetes security checklist of best practices and security recommendations to help you keep track of your progress. To make this a little easier, we’ve divided this checklist into the following sections.

A 7-Step Process for Strategic Risk Management

Modern-day enterprise risk management (ERM) is a disciplined, organization-wide approach to identifying and addressing a wide range of enterprise risks, such as operational risk, financial risk, compliance risk, and strategic risk. Organizations with robust ERM programs can better manage and mitigate risk and minimize the potential for losses or damage. ERM incorporates different strategies, tactics, and plans for each type of risk because those risks affect the organization in different ways.

AuthPoint MFA Recognized for Optimal Performance and Competitive Price Offer

WatchGuard and Miercom, an independent organization focused on product testing, have worked together on testing three MFA solutions to assess performance and cost effectiveness, as well as user and admin experience. AuthPoint MFA was tested competitively with two similar solutions: Cisco Duo and Azure MFA.