Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Network segmentation best practices (how to implement)

Your network segmentation strategy has a broad impact on security policies and processes throughout your organization. It defines your organization’s attack surface and establishes the level of difficulty hackers will face when trying to gain network access. Optimized enterprise networks also correlate strongly with productivity and performance gains.

Firewall has detected a new network

If your firewall shows a notification that it has detected a new network, it means it is doing one of its fundamental jobs properly. But good network security does not stop with just detecting a new network. You will have to analyze the network location, ensure it is authorized to connect with your network, automate this process, and ensure full-on monitoring so that none of the intrusive attempts ever go unnoticed.

How to fix misconfigured firewalls (and prevent firewall breaches)

Firewall misconfigurations are one of the most common and preventable security issues that organizations face. Comprehensively managing access control, addressing vulnerabilities, and detecting configuration mistakes under these conditions is not easy It’s especially challenging for organizations that use the default firewall rules provided by their vendor. Your firewall policies should reflect your organization’s unique cybersecurity risk profile.

Network segmentation vs. VLAN explained

Safeguarding the network architecture is the need of the hour. According to a study, the average cost of a data breach is at an all-time high of $4.35 million. And this figure will only increase with governments and regulators becoming ever stricter on data breaches. In this article, we will explain the core difference between network segmentation and VLAN and when you should opt for a particular one over the other.

A New Version of Mend for Containers is Here

As modern software becomes increasingly cloud-based and containerized, application security tools must adapt to meet new challenges and provide security coverage across the software development lifecycle (SDLC). The use of container platforms like Docker and orchestration tools like Kubernetes inherently solves some security concerns – but containers are not without risk, and can even inject some new risks into your organization’s software.

Navigating the New SEC Cybersecurity Rules with Komodo Consulting's Expertise

In a world where cybersecurity threats are increasingly prevalent, the U.S. Securities and Exchange Commission (SEC) has taken a significant step towards ensuring transparency and accountability in how companies manage these risks. The SEC has adopted new rules requiring companies to disclose material cybersecurity incidents and provide annual updates on their cybersecurity risk management, strategy, and governance.

The Value of Security Awareness Training For Your Organization

As organizations across the globe grapple with the growing issue of cyber attacks — 2023 cybercrime costs are expected to hit $8 trillion — organizations are realizing that more than technical tools are needed to stay ahead of mounting threats. Even one mistake by an untrained employee can have serious consequences and result in a data breach.