Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

ISO 27001:2022 and the new requirements for Data Leakage Prevention

The ISO 27001 is one of the most recognized security standards for private sector organizations across the globe and is often required by prospective enterprise customers, helping organizations unlock new business opportunities. ISO 27001 was recently updated along with its companion guidance standard ISO 27002. The updated title for this standard is ISO/IEC 27001:2022 Information Security, Cybersecurity, and Privacy Protection.

Trustwave 2023 Cybersecurity Predictions: Part 1

In predicting what will transpire in cybersecurity in 2023, the best method is to look at past experience. As with any security and criminal activity, threat actors tend to build upon what they have done in the past, adding new twists to keep their tactics fresh and effective. So, taking this into consideration, it is no surprise that Trustwave's security experts see much of the same type of attacks that plagued 2022 continuing.

CrowdStrike Named a Leader in Frost & Sullivan's 2022 Frost Radar for Cyber Threat Intelligence

CrowdStrike is excited to announce we have been recognized by Frost & Sullivan as a global leader in the Frost Radar™ Global Cyber Threat Intelligence Market, 2022 analysis. Earlier this year, CrowdStrike was named a leader in the 2022 SPARK Matrix for Digital Threat Intelligence Management by Quadrant Knowledge Solutions; last year, we were named a leader in The Forrester Wave™: External Threat Intelligence Services, Q1 2021.

Big Trends and Hot Topics From H-ISAC 2022

Two weeks ago, I had the opportunity to attend and speak at the H-ISAC fall summit here in Phoenix. As always, this conference is a great opportunity to meet back up with customers and friends from all around the Healthcare sector. This leads to illuminating conversations that really give me a higher definition picture of what is happening in the trenches and helps me better understand how the work we’re doing here at Netskope can help.

Event Log Monitoring and Log Audit Software Basics

Event logs can help you spot and troubleshoot security events so you can protect your systems and data. However, log records can be hard to read, and logs so noisy that you often have to sift through pages of events to identify critical events and potential threats. Read on to learn more about audit logs, log analysis and log auditing software.

How To Keep Your Business Prepared for this Holiday Hacking Season?

Holidays are around the corner, and so are the hackers. They are waiting for your relaxed mindset and reduced staff coverage. For instance, 89% of organizations reportedly experienced holiday ransomware attacks. Of these, 36% had no contingency plans, causing significant damage. Also, there is an increased risk of online fraud and phishing attacks. Scammers targeted 75% of Americans with at least one form of holiday fraud in 2021. Have you taken any steps to protect your business?

Retail: cybersecurity guide for a happy holiday season

Over Christmas we relax and let our guard down as these are festive times to share with friends and family. Cybercriminals capitalize on this to launch attacks, with a spike in incidents on the days between Christmas and New Year. Threats involving social engineering to gain users’ trust are particularly common, hackers then spread fraud, ransomware and malware, enabling them to infect computers, steal private data and defraud users.

Tripwire & Towerline: Easing the burden of the NERC CIP audit process

When we speak of necessary evils, some images readily spring to mind. A dental appointment, automobile insurance, and many others. In cybersecurity, audits fit this image quite well. There are many uncomfortable aspects of audits, including the need to maintain accurate records, as well as finding the time to perform all the work required to satisfy the auditors.