Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How proper use of Identity and Access Management (IAM) can protect your organization from breaches.

In the world of security, authentication, and authorization methodologies are foundational aspects of defense. Authentication techniques protect against unlawful entry to systems through the verification of a user, and authorization either grants or denies the verified user’s access level.

MFA is the authentication method of choice for 83% of companies

Passwords are the most widespread form of authentication on different platforms and systems. Still, companies and users often do not prioritize creating strong passwords and continue to opt for simple and very weak passwords in the eyes of cybercrime professionals.

Machine Learning in Security: Deep Learning Based DGA Detection with a Pre-trained Model

The SMLS team enables Splunk customers to find obscure and buried threats in large amounts of data through expert analytics. This work is part of a set of machine learning detections built by a specialized team of security-focused data scientists working in concert with Splunk’s threat research teams to help Splunk customers sift through vast amounts of data to identify and alert users of suspicious content.

Introduction to Web Application Security: Why It's Important to Keep Your Website Safe

As web applications become more complex and interconnected, the security of these applications becomes increasingly important. In this article, we will discuss web application security, why it is crucial, and how you can test your web applications for security vulnerabilities. By taking measures to secure your website, you reduce the risk of cyberattacks, protect your data from unauthorized access, and save you and your business time and money.

FTC's New Deadline for the Gramm-Leach-Bliley Safeguards Rule

The Gramm-Leach-Bliley Act (GLBA) applies to many types of financial institutions, like banks, savings and loans, credit unions, insurance companies and securities firms. It requires those organizations to explain their information-sharing practices to their customers and to protect sensitive data. On November 15, 2022, The FTC announced a six-month extension for companies to comply with data security provisions in the GLBA. The new deadline is June 9, 2023.

Why Tanium is an Outperformer in GigaOm's New Patch Management Report

Patch management is an essential prerequisite for continuous cyber risk mitigation. But it’s not getting any easier. That makes finding the right security partner an essential task for any IT operations leader. But this too is fraught with difficulty in a market saturated with vendors. This is where independent market analysis can be invaluable.

New Feature: Custom Damage Types

Custom Damage Types provide users with the ability to add specific types of damages that will be taken into consideration as part of the modeling process when quantifying financial exposure. This means, organizations now have a unified view of costs that consider company specific data alongside out of the box modeled costs. Users will need to provide a range of possible costs and create a scenario that triggers assigned costs.

Check the cyber insurance readiness of your organization

The rise in the frequency and intensity of cybercrime has seen many organizations turning to cyber insurance to help protect against the extent of financial losses following a cyberattack. While identifying and adopting a comprehensive cybersecurity strategy is crucial, even the most secure networks can still be exploited by adept hackers. According to reports, the global cyber insurance market is projected to grow from $11.9 billion in 2022 to $29.2 billion by 2027.

Torq Users Hit 1,000,000+ Daily Security Automations

Security automation is an increasingly critical element in optimizing enterprise cybersecurity postures. Today, Torq announced its users are executing more than 1,000,000 daily security automations using our security automation platform – a major milestone that underlines the traction and importance of unifying today’s complex security stacks.