Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

What is ISO 9001? Quality Management System (QMS) Standards

The International Organization for Standardization created ISO 9001 to provide an archetypal standard for quality management systems (QMS) worldwide. The most up-to-date version of the framework is ISO 9001:2015, which highlights the importance of risk-based thinking and decision-making to improve output and product quality. Utilized by organizations of all sizes and across most major industries, ISO 9001 helps streamline operations and align day-to-day processes with strategic objectives.

The Crucial Role of Identity in Zero Trust Security

In an increasingly digital world where cybersecurity threats are constantly evolving, organizations are embracing new strategies to protect their sensitive data and assets. One such approach that has gained prominence in recent years is Zero Trust. Zero Trust challenges the traditional perimeter-based security mindset and instead places a strong emphasis on identity as a cornerstone of a robust defense strategy.

How to Build an Effective ICS Security Program

Of all the different areas of cybersecurity, not many are as important, or have as far-reaching consequences as industrial control systems (ICS) security. While most relevant organizations would agree that ICS security is a significant concern for their operations, it is easier said than done. Many find it difficult to put into practice the measures and solutions necessary for sufficient ICS security.

How to Protect Your Facebook Account from Cybercriminals

The social media landscape has undergone dramatic change in recent years. Elon Musk bought Twitter and changed its name to "X." Mark Zuckerberg bought Instagram and WhatsApp before launching Threads to capitalize on Twitter's recent PR disasters. TikTok came out of nowhere to become the platform of choice for Gen Z. One thing, however, has stayed the same. Facebook remains, somewhat surprisingly, the most popular social media platform.

Leveling up Elastic Cloud security: Introduction to role-based access control

Did you know that you can assign roles to users to implement fine-grained control for your Elastic® Cloud organization and deployments? Role-based access control (RBAC) is a cloud security best practice that is considered a standard feature in enterprise software, as it provides a structured way to manage access to cloud resources. Within an RBAC framework, roles are a vital construct for grouping, organizing, and delegating permissions to different users.

Black Hat Asia customer panel recap: How to lead DevSecOps adoption

DevSecOps is all about collaboration: facilitating a solid partnership between development and security teams. However, these collaboration efforts won’t succeed without help from leadership. Development and security teams need top-down support to set measurable goals, create a secure CI/CD pipeline, and establish a DevSecOps culture. Three experts came together at Black Hat Asia 2023 to discuss how leadership can participate in fostering security success.

Keeper Security Introduces Major UI Update for Android

Keeper Security is excited to announce a significant update to our Android app that we think users will love. This update is heavily focused on bringing the same fresh, modern look to our Android user interface that our Web and Desktop received earlier this year and iOS just last month. The highly anticipated release incorporates improved usability and a distinctly light and modern theme.

As MGM Struggles Amid Ransomware Fallout, Data Recovery Lessons Abound

Picture this: Your IT infrastructure is breached by a nefarious actor, who then encrypts critical data and holds your organization hostage until a ransom is paid. Far from hypothetical, this is exactly what happened to multi-billion-dollar casino operator MGM Resorts International last week when hit with a ransomware attack – the latest in a string of large-scale, high-profile cyber security incidents.

The International Joint Commission Falls Victim to Ransomware Attack; 80GB Of Data Stolen

The International Joint Commission (ICJ), an organization that handles water issues along the Canada–United States border, was hit by a ransomware attack, the Register reports. The Commission said in a statement, “The International Joint Commission has experienced a cyber security incident.

National Coding Week: Closing the skills gap with secure code training

Want to know the best way to make sure you can get a good job with good pay? Choose a field where the demand for workers exceeds the supply. Welcome to computer coding. While estimates of a skilled worker shortage vary, most put it somewhere in the dozens of millions worldwide. And it’s the catalyst for National Coding Week (NCW), which runs September 14-20. The event, launched in 2014 in the U.K.