Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

The benefits of Privileged Access Management for compliance and regulation

Privileged Access Management (PAM) is a crucial aspect of any organization's cybersecurity strategy, especially in industries that handle sensitive data, such as health care, finance and government. PAM involves implementing policies, procedures and tools to manage and monitor access to privileged accounts and limit the risk of unauthorized access or misuse. This ensures that only authorized personnel can access critical systems and data, reducing the chances of a security breach.

SIEM vs. MSSP vs. MDR: An Essential Guide

Cybersecurity is a constant journey, always full of fresh challenges. New threats keep popping up. Endpoint-only solutions are ineffective. And the cybersecurity skills shortage makes it difficult to recruit and retain top talent — especially with the increasing salaries required to be competitive. You may consider a security operations center (SOC), until you find out that operating one in-house is prohibitively expensive and time-consuming.

The Top Cyber Attacks of May 2023

May often heralds the start of summer — warm weather, long days, and plenty of cybersecurity workers taking much needed time off. Cybercriminals however, are always at their monitors and love to take advantage of times when they know defenses may be down and this month was no different. May saw a wide range of cybercrime, including disruptions of schools and news organizations, a slow-burn in the tech sector, and public negligence from one of the web’s most well-known entities.

Snyk scanning capabilities are now embedded in Jira Software

Today, development is faster than ever. More apps and code are being written than ever before. There are more third-party dependencies in use to speed development, more containerization, and even code that controls the deployment and configuration of apps and the cloud. To ship quickly, developers need to stay on top of security issues. They want to understand how to build secure applications by getting feedback as they work.

How to Establish a Cybersecurity Baseline That Works for Your Organization

A cybersecurity baseline is an invaluable set of standards for your organization. It helps you understand your security posture, identify security gaps, and meet cybersecurity regulations. The most widely adopted cybersecurity baselines are those recommended by the NIST Cybersecurity Framework, the SANS Top 20 Critical Security Controls, and Shared Assessments (designed for third-party risk management). We covered the specifics of these frameworks in a previous blog.

Tines achieves key AWS Partner milestones ahead of re:Inforce 2023

We’re excited about achieving several key milestones with Amazon Web Services as we head into re:Inforce 2023 next week. These milestones include achieving the AWS Security Competency, partaking in the Amazon Security Lake launch as a subscriber partner, and the introduction of a Tines-Amazon GuardDuty partner solution. To date, the flexibility of our no-code automation sets us apart from other automation partners by automating across any AWS workflow.

Casepoint Exposes Government, Medical, and Legal Data in Recent Breach

Casepoint is one of the first companies to get approval to serve as an eDiscovery tool for Federal and State governments in the United States. The company manages legal data for huge agencies and is the home of many legal secrets that could provide lawyers with an edge if they had access to all the company's data. That's why Casepoint suffering from a data breach is such a significant problem.

Federal Cybersecurity Posture is Improving, but Additional Work Remains

Former Texas Congressman William "Mac" Thornberry and Trustwave Government Services President Bill Rucker recently sat down to discuss several pressing issues impacting the federal government’s cybersecurity preparedness, the impact the Russia-Ukraine War has had on cyber, and what remains to be done to shore up the nation's cyber defenses. This is the first of a two-part conversation.

Enhancing Online Security: Effective Measures to Prevent MiTM Attacks

MiTM or Man-in-the-middle attack is one of the most common cyberattacks that online users must be aware of. Anyone who’s actively connected to the internet for both work and entertainment purposes is at risk of being a victim of a MiTM attack. Fortunately, you can prevent the above from happening. This blog is here to help. Below, we’ll discuss MiTM attacks, their types, how they work, and how to prevent becoming a victim.