Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Meeting the 3rd-Party Risk Requirements of The NY SHIELD Act

The Stop Hacks and Improve Electronic Data Security (SHIELD) Act is designed to protect the personal data of all New York residents. This act broadens the data privacy and protection standards stipulated in the Gramm-Leach-Bliley Act (GLBA) and the New York Department of Financial Services (NYDFS). What makes this particular data protection law unique is its inclusion of biometric information, usernames, and passwords in the category of personal information.

Use new Cloud SIEM Entity Groups to make threat response more efficient

Security analysts and administrators need every advantage to keep up with prioritizing and investigating alerts. A SIEM (security information and event management) solution helps uncover threats, but it takes a lot of time assigning and updating tags, criticality, and signal suppression. Sometimes users opt to skip the step altogether, especially if there are a lot of entities to add or update at once. Other times, they introduce errors during this manual step.

Nightfall vs. Aware: Looking for an alternative to Aware?

Most companies are determined to make remote work feasible for the future. To do so, they need the right tools to maintain data security while their employees work here, there, and everywhere. There are many tools on the market that enable cloud security, and understanding which options are right for your business can be confusing. Different vendors offer different features, compliance with different regulations, levels of complexity, and types of coverage.

JFrog Xray Integration with AWS Security Hub

SecOps demands vigilance, but it requires visibility, too. With JFrog’s latest integration for Xray with AWS Security Hub, you can help make sure that discovered vulnerabilities are not just seen, but quickly acted on. AWS Security Hub is the cloud security posture management service available to AWS users. It provides central security administration across AWS accounts, performing security best practice checks, aggregating alerts, and enabling automated remediation.

Automated Threat Intelligence Enrichment: An Overview

Discovering security threats is good and well. But, in many cases, simply knowing that a threat may exist is not enough. Instead, you also need threat intelligence enrichment. Threat enrichment plays a critical role in helping to evaluate and contextualize threats, root out false positives and gain the insights necessary to mitigate risks as efficiently and quickly as possible.

CCPA Compliance Vs CPRA Compliance

The California Consumer Privacy Act (CCPA) is a law that was signed on June 28, 2018, that established and promoted the consumer privacy rights and business obligations concerning the collection and sales of personal information of citizens of California. The CCPA came into effect on January 1st, 2020. Soon after in November 2020, Proposition 24, known as the California Privacy Rights Act of 2020 (CPRA) was introduced which is soon to replace the CCPA Compliance.

Keeper vs Delinea: Which Privileged Access Manager is Better for Your Business?

Privileged access management (PAM) uses cybersecurity strategies, tools, and technologies to control access permissions for users and systems across an IT environment. The goal is to hone in on privileged access controls to mitigate the risks of a cyberattack. According to the 2021 Privileged Access Management Solutions Market Offering, the global PAM solutions market size was valued at $2.47 billion in 2020 and is projected to reach $19.73 billion by 2030.