Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Executive Order on Improving the Nation's Cybersecurity: One Year Later

In May 2021, President Joe Biden signed the 30 - page Executive Order (EO) on Improving the Nation’s Cybersecurity covering a host of cybersecurity issues. It mandates that Executive branch agencies deploy multifactor authentication, endpoint detection and response, and encryption. It also describes how government agencies should evaluate the software they buy and calls for these agencies to adopt "zero trust" architectures and more secure cloud services.

The Anatomy of Wiper Malware, Part 1: Common Techniques

This blog post is the first in a four-part series in which CrowdStrike’s Endpoint Protection Content Research Team will dive into various wipers discovered by the security community over the past 10 years. Our goal is to review in depth the various techniques employed by wipers that target the Windows operating system.

What is a Spoofing Attack and How Can You Prevent Them?

At the heart of almost every business interaction lies trust. Whether logging in to a website, providing information over the phone, or interacting via email, trust is essential when the communication involves money, sensitive data, or both. To win a victim’s trust, gain access to a secure system, receive sensitive data, or insert malicious software, cybercriminals use various tools and tactics to mask their identity or disguise their devices. These tactics are the foundation of a spoofing attack.

Singapore's PDPA Penalties Set to Increase Starting Oct 1

While the Singapore Personal Data Protection Act (PDPA) 2020 Amendment phases came into effect on Feb 1, 2021, starting on October 1, 2022, the maximum financial penalty for breaches of PDPA will be increased. Here’s what you need to know for the next phase of PDPA and how to ensure your information security practices are compliant to avoid penalties.

How to reduce your exposure & secure your data in the cloud in 5 quick ways

More companies are switching from on-premises systems to public cloud services, ensuring long-term growth and digital resilience. But as their implementations grow, they begin to realize that their exposure to cyberattacks and other risks grows as well. Cybersecurity is an essential practice for successful businesses. Adapting to business growth is a good problem to have, but without an eye on cloud security, that growth could cost you in the long run.

Data Security Controls: Six Types and How to Implement Them

According to IBM's 2021 report, the average data breach cost more than $4 million worldwide in 2021. In the United States, that number rises to $8 million. That's an over 10% increase over the previous year. So, data breaches are a significant business risk. But costs aren't the only reason to tighten your security. Breaches hurt your clients and your company's reputation. You've seen data breaches in the news. Every day brings news of a fresh attack.