Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

DFIR Expert Interview: Kimber Dowsett

Please introduce yourself and tell us what you do, and what your company does. I’m Kimber Dowsett and I’m a Director at Krebs Stamos Group(KSG). We conduct cybersecurity consultancy engagements for high-profile organizations that may or may not have experienced a high-profile breach or acquisition, or simply want a world-class assessment of their org’s overall security posture.

How Should Startups Build Their Tech Stack?

At the beginning of every startup’s journey, the question plaguing every technical founder and their team is how to build their tech stack. A lot of thought must go into this question because it informs how the startup will adapt to the demands of business growth and any necessary adjustments or pivots of the business. In a recent webinar, we discussed this question in detail with Jim Walker of Cockroach Labs.

RSA 2022-What a Week!

After two years of virtual events, the Mend team was beyond excited to gather in San Francisco’s Moscone Center and connect with the tech community face to face. This year’s theme was ‘transformation,’ which couldn’t be more appropriate for us as we unveiled our new company name and integrated application security platform with automated remediation for SCA and SAST.

4 key strategies for the retail industry to fend off rising cybersecurity risks

Retailers are facing a more challenging cybersecurity environment than ever, according to a new study, Cybersecurity solutions for a riskier world. With physical and digital worlds colliding, greater levels of regulation, and more savvy cybercriminals, executives agree that we have entered a new era of cyber risk. In fact, 30% of retailers say they are not prepared for the threats ahead. In response to these changes, the role of the retail CISO is expanding.

Operational Risk Management: More Than Just Cybersecurity

In an ideal world, every organization would operate at peak capacity, have perfectly efficient operations, and never experience system failures, cyberattacks, or fraud. In the real world, however, it’s impossible to avoid such adverse events completely. Every organization faces problems due to weak business processes, system downtime, human error, and cybersecurity attacks. Businesses can, however, manage and mitigate the risks that lead to such events, to keep your business functional and viable.

Top 5 Risks Affecting the Healthcare Industry

Cybersecurity is a constant, serious threat to the healthcare industry. Unfortunately, however, the risks to cybersecurity and data security in healthcare are only one part of the larger risk management puzzle for healthcare organizations. Infections, alarm fatigue, telemedicine, and a lack of emergency preparedness also pose severe threats in healthcare. To minimize exposure, healthcare organizations require a comprehensive risk management program.

How we make ADSelfService Plus more secure for you

Security experts around the world are talking about the importance of improving security measures to keep networks safe—and for good reason. We have plenty of examples of how relentless threat actors can be, and we’ve now seen that not even a pandemic can stop or slow down their attacks.

Ensure compliance, governance, and transparency across your teams with Datadog Audit Trail

In order to maintain compliance, enforce governance, and build transparency, teams across your organization need deep insight into how their users and automation interact with Datadog. For stakeholders in leadership roles, such as CIOs and CDOs, knowing what actions users took and when is essential for spotting gaps in enablement, budgeting, and reporting, as well as building a modern compliance strategy for the organization as a whole.

Security frameworks / attestations and certifications: Which one is the right fit for your organization?

While there is an alphabet soup of compliance requirements and security standards frameworks, this post will focus on the two prevalent certifications frequently discussed for SaaS and B2B businesses. Security and compliance qualifications, like SOC 2 and ISO 27001, demonstrate that you apply good practices in your business. They are often classified as "security" and thought of as the technical security of your systems.

New functionality added to the Detectify API

Getting a complete overview of the growing attack surface is difficult. Regardless of how security is organised in your organisation, knowing what Internet-facing assets are exposed and if those assets are vulnerable across many different teams is no simple task. This is doubly true for security teams with dozens – or even hundreds! – of dev teams. We’ve now made it possible for customers on the Enterprise Plan to create and manage subteams through the Detectify API.