Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Tines named HashiCorp's 2023 Emerging Partner of the Year

We’re thrilled to announce that Tines has been named HashiCorp’s 2023 Emerging Partner of the Year. The award is especially significant, as it marks the success of our partnership with HashiCorp within its very first year. Tines was recognized for our smart, secure workflow builder, which allows frontline teams to work more efficiently and effectively by incorporating HashiCorp Terraform and Vault across their automations.

SecurityScorecard Cybersecurity Data Incorporated into S&P Global Market Intelligence's Newly Launched Supplier Risk Indicator

The world around us is often a reflection of who we are and what we value. The same can be said for businesses. It’s no longer enough to be resilient, trustworthy, and secure your own organization; the companies you do business with need to meet these same standards.

Creating a Vendor Risk Summary Cybersecurity Report in 2023

A vendor risk report provides stakeholders with a snapshot of your Vendor Risk Management (VRM) performance. With concerns over the threat of supply chain attacks growing, cybersecurity reporting is evolving towards an increased focus on Vendor Risk Management program performance. Board members and senior management want to know how effectively your VRM initiatives are identifying and addressing vendor-related security risks.

Creating a Cybersecurity Report for Senior Management in 2023

A cybersecurity report shouldn’t be feared. Instead, it should be regarded as an opportunity to demonstrate the effectiveness of your cybersecurity program, and while management is brimming with delight over your efforts, maybe also a chance to sneak in a request for that cyber budget increase.

Is October only for Halloween?

October is a busy month for awareness campaigns and Halloween! Perhaps you already knew that October is both Breast Cancer Awareness and Domestic Violence Awareness Month, but did you know it is also National Cybersecurity Awareness Month (NCSAM)? NCSAM is a government-created campaign in the United States. It is an initiative of the U.S. Department of Homeland Security (DHS) and the National Cyber Security Alliance (NCSA).

How to Get a Job in Cybersecurity by Leveraging LinkedIn

Landing a SOC job and breaking into the cybersecurity space can feel daunting. One way to set yourself up for success is to leverage professional social networking sites like LinkedIn. When used correctly, LinkedIn can be a powerful tool for growing your connections and landing your dream gig. Not sure how to get a job in cybersecurity by using LinkedIn? Here are some tips.

Demystifying the Dark Web and DarkNets, Part V-FINs, APTs, Rogues, Hacktivists, Cyber Warriors, and Accidentals

In our last installment of this series, we were introduced to some dangerous characters one might encounter on darknets. This week, we will finish out that list, looking into both organized groups and individuals. Wrapping my head around why people do what they do, and how they execute operations that end up costing corporations millions, is always fascinating.

Florida Courts Bleed Data Following Supposed BlackCat Ransomware Assault

Florida’s First Judicial Circuit hosts 33 courts in the Northwest of the state. The region serves over 1.4 million residents, most of whom live within areas heavily impacted by the military. Last week, the Florida Courts suffered a data breach, which halted operations across the district starting on October 2nd. In the last 72 hours, ransomware gang BlackCat has claimed responsibility for the assault—and may be holding the credentials for ransom.

Enhancing AKS Security with Microsegmentation

As organizations adopt Microsoft AKS at scale, they need to enforce namespace or even workload-based isolation for better security and compliance. This isolation, often referred to as microsegmentation, can help prevent the lateral movement of threats inside Kubernetes clusters, achieve compliance by limiting communication across workloads or namespaces, and enable multi-tenancy by limiting communication.