Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Top Identity Verification challenges faced by regulated industries and How to overcome them

Identity verification has become an essential aspect of various industries in today’s world. With the advent of technology and the growth of the digital economy, it has become increasingly important for businesses to verify the identities of their customers, clients, and partners. However, regulated industries such as finance, healthcare, and gambling face unique identity verification challenges due to the sensitive nature of their services and the regulatory requirements they must comply with.

Cybersecurity in the Energy Sector: Risks and Mitigation Strategies

The demand for cybersecurity in the energy sector is often understated. There is a misconception that very little IT is involved, and much of it does not impact operations. But 97% of surveyed ICS security professionals in the energy, oil, and gas sector believe cybersecurity is a growing concern. No industry has been untouched by digital transformation.

What Is Microsegmentation and 5 Compelling Security Use Cases

Microsegmentation is a security technique that partitions a network into small, isolated sections to reduce the attack surface and reduce an organizations risk. Each microsegment is typically defined by specific security policies, accessible only to authorized users and devices.

How to establish network security for your hybrid workplace

The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. The global COVID-19 pandemic has left lasting effects on the workplace across all sectors. With so many people required to stay home, businesses in every field turned to remote work to open new possibilities for staying connected across distances.

Security Training Shouldn't Be A Stress Test

A lengthy, stressful test is what comes to mind when most people hear the acronym “SAT.” But the other “SAT” — a security awareness training, or SAT, program — can also embody those qualities if it’s not managed correctly, and cause just as many headaches for an organization fighting to mitigate phishing attacks and social engineering scams.

Understanding and Preventing Ransomware Attacks

Understanding ransomware attacks is the first step in being able to prevent them from successfully targeting an organization. To prevent ransomware attacks, organizations must have strong security protocols in place such as performing regular system backups and training employees to avoid social engineering scams, among other measures. Continue reading to learn more about ransomware attacks and what organizations can do to stay protected against this type of attack.

Datadog acquires Codiga

Developers spend over a third of their time fixing bad code and reducing technical debt. Detecting and fixing errors in production is not only more costly than doing so during development but also slows down innovation and has a negative impact on productivity, the development experience, and team morale. Having tools that help catch and fix coding mistakes earlier in the development process creates a better experience and increased productivity.

Gain visibility into open source vulnerabilities with Datadog Application Vulnerability Management

Open source libraries have become an indispensable part of modern applications. Approximately 90 percent of organizations use open source software to support their services, but monitoring these dependencies can be difficult when environments run thousands of ephemeral services.