Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

EO, EO, It's Off to Work We Go! (Protecting Against the Threat of Ransomware with Splunk)

On June 2nd, 2021, the White House released a memo from Anne Neuberger, Deputy Assistant to the President and Deputy National Security Advisor for Cyber and Emerging Technology. The subject? “What We Urge You To Do To Protect Against The Threat of Ransomware.” It outlines several recommendations on how to protect your organization from ransomware. The memo was a follow-up to President Biden’s May 12th Executive Order on Improving the Nation’s Cybersecurity Order (EO14028).

What Is Cloud Infrastructure?

The term “cloud infrastructure” refers to both the hardware systems and software applications that support a cloud computing environment. This might include cloud storage, virtualization applications, IT management tools, API connectivity, and relevant cloud service providers. In a cloud computing environment, all of the aforementioned IT infrastructure components would be hosted offsite by a service provider and delivered through an internet network.

What Are the Types of Information Security Controls?

When safeguarding your business against cyberattacks and data breaches, CISOs and compliance officers can choose from all sorts of information security controls — everything from firewalls to malware detection applications, and much more. Thankfully you don’t have to start from scratch when implementing cybersecurity controls. Many standards and frameworks exist that can help you secure your IT systems properly.

Is NIST Mandatory?

You don’t have to spend a long time in the cybersecurity and information technology world before someone brings up NIST compliance. Since the agency’s inception in 1901 — yes, it’s that old — the National Institute of Standards and Technology has been trusted as the guardian of all proper measurements and standards, including cybersecurity standards meant to increase data security. NIST, which these days is part of the U.S.

Protecting a New Vulnerable Population on the Internet

Abraham Lincoln is credited with saying that “A lawyer’s time and advice are his stock and trade.” Whether the quote is mis-attributed to Lincoln is irrelevant to the greater message, which is that attorneys are “knowledge workers.” To state it as bluntly as one attorney once explained to an executive where I worked, “My knowledge will keep you out of jail.” As a cybersecurity professional, you too are a knowledge worker.

Securing Computerized Vehicles from Potential Cybersecurity Threats

Like technology itself, cybersecurity is ever-evolving and encompassing more areas of our lives, including transportation. Popular science fiction movies have led us to expect flying taxis and private space travel as the future of transportation. If that is going to become an eventual reality, the first steps towards that future are “smart cars” and automated vehicles. Electric vehicles are expected to account for 58% of global passenger vehicle sales by 2040.

What is Enterprise Digital Rights Management (EDRM)?

EDRM sometimes referred to as Information Rights Management (IRM) is a core-data-centric technology that offers uninterrupted protection to unstructured data. It protects sensitive information/data everywhere by managing and enforcing access and usage rights to the information throughout its lifecycle, no matter where the information is distributed. EDRM controls how employees and partners use sensitive information.

SentinelOne Advanced AlienApp

In today’s threat landscape there is no escape from having a 360° view to protect crucial organization assets. The criticality of the matter is greatly amplified in these times where working remotely has become vastly common among Enterprises and SMBs alike. An ideal security solution would combine threat detection & response on cloud resources as well as on the endpoint level, providing extensive, real-time and impactful coverage customers desperately need.

Digital transformation explained

No matter what sector your organization does business in, you’ve probably heard the term digital transformation. In every industry, digital transformation is going to be critical to remain competitive and resilient. But what does digital transformation mean? And how does cybersecurity fit in? Today’s organizations are facing an increasingly complex environment of securing everything attached to the network; applications, data, and endpoints.