Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Weekly Cybersecurity Recap September 22

This week, we noticed that data breach attackers targeted a substantial number of hospitals. north Carolina patients are being impacted the most currently. Along with health groups like Atrium and Novant Health, nonprofit Save the Children was hit by a breach, as was the TransUnion credit bureau and Caesars Entertainment. A huge number of people were impacted by this breach between these different major organizations.

Atrium and Novant Health Get Attacked and Patients Suffer in 2023

Both Atrium Health and Novant Health are health organizations that work with a large number of hospitals offering services. These v work with data from thousands of patients and enable standard hospital practices to occur. Between the two organizations, a huge number of different hospitals and private practices are involved. That's why it's upsetting to learn that both of these organizations were recently breached.

How to Prevent Third-Party Vendor Data Breaches

Third-party data breaches can happen at any time to any organization. This type of breach occurs when a vendor (or some other business partner) holding your company’s data suffers a breach, and your data is exposed. According to the Verizon 2022 Data Breach Investigations Report, 62 percent of all data breaches happen via third-party vendors.

A Guide to ISO 22301: Business Continuity Management Systems

The International Standardization Organization (ISO) introduced the latest version of ISO 22301 in 2019. This framework includes strategies, standards, and requirements organizations can use to implement a business continuity management system (BCMS). To appeal to and assist the most comprehensive array of organizations, ISO 22301 includes generic regulatory requirements that organizations can implement to improve organizational resilience in various contexts.

Extending Kubernetes traffic identity with Calico Egress Gateway to Sophos Firewall

By default, traffic leaving a Kubernetes cluster lacks a meaningful network identity, making it challenging to associate it with its source workload. This is an issue because, in an on-premises infrastructure, companies rely on firewalls, for example Sophos Firewall, to inspect this traffic which loses its identity as soon as it leaves the cluster.

The Best And Easiest Ways To Secure The Data In Your Company

The business world has changed drastically in the last 20 years. Almost all of the important data is now online. This can be pretty useful, but it can also be dangerous. Why? Well, as the business landscape changed, so did the business espionage. Malicious people online are trying their very best to steal sensitive and confidential data and sell it on the market.

The world needs start-ups to meet IoT security challenges

I read this article earlier this week from Jeff Vance and I was buoyed by the refreshing reflection of reality – Jeff really hits the nail on the head. As the CEO of a cyber security start up, we see, hear, and feel these points daily and the fact is that so many larger security or network businesses claim to solve problems that they cannot. Not only is this doing a disservice to customers but to the wider security landscape. Let’s explore this further…

Cloudflare Email Security now works with CrowdStrike Falcon LogScale

We are excited to announce an extended partnership between CrowdStrike and Cloudflare to bring together Cloudflare Email Security and CrowdStrike Falcon® LogScale. With this integration, joint customers who have both Falcon LogScale and Cloudflare Email Security can now send detection data to be ingested and displayed within their Falcon LogScale dashboard.

Economic impact of automation and artificial intelligence

One of the most important technology trends in cybersecurity is AI (artificial intelligence). The idea behind AI in cybersecurity is to use AI-enabled software to augment human expertise by rapidly identifying zero day malware, APTs, malwareless attacks, or hacking attempts, reducing the organizations’ incident costs.