Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Protecting unstructured data

Before we zoom in on the problems with unstructured data in the finance industry, let’s take a step back and look at the massive proliferation of data in general. Did you know, around 59 zettabytes (ZB) of data – that’s 59 with 21 zeros after it – were expected to be created, captured, copied and consumed in the world, according to Global DataSphere from International Data Corporation ( IDC)? That’s a lot of data!

Go cloud or go home: the advantage of cloud-delivered cybersecurity

It seems as if everything is happening in the cloud now — whether I’m sharing a document with a colleague or backing up family photos. This is happening in cybersecurity as well, where the storage flexibility and computing power of the cloud have enabled new ways to secure organizations.

Cloud Auto-Remediation and Enforcement with Tripwire Configuration Manager

Determining the security posture for an increasing quantity of cloud accounts and services used by many organizations can feel overwhelming, but Tripwire Configuration Manager can help you find, fix, and even enforce settings for common security problems in cloud services. In this blog, we will show how the simple steps required to have Tripwire Configuration Manager automatically fix common configuration issues.

The Next Disruptive ICS Attacker: A Disgruntled Insider?

Often, the most critical threats come from within an organization itself. This is true for all sectors, but it is especially true for industrial control systems (ICS). Technicians in these environments already have access to plant controls and may have the deep knowledge of industrial processes needed to achieve specific goals. The damage caused by an insider may range from mild disruption to major disaster depending on what is attacked.

What Are the Key Challenges Facing IT and OT?

The events of 2020 accelerated many organizations’ efforts to converge their information technology (IT) and operational technology (OT) environments. Now that they’re immersed in this journey, some organizations are finding that it’s not quite as smooth as they were expecting. They’re learning that they need to overcome several challenges if they hope to leverage the IT-OT convergence as part of their ongoing digital transformations. That raises some important questions.

Sponsored Post

When Dominoes Fall: Microservices and Distributed Systems need intelligent dataops and AI/ML to stand up tall

As soon as the ITOps technician is ready to grab a cup of coffee, a zing comes along as an alert. Cling after zing, the technician has to respond to so many alerts leading to fatigue. The question is why can’t systems be smart enough to predict bugs and fix them before sending an alert to them. And, imagine what happens when these ITOps personnel have to work with a complex and hybrid cloud of IT systems and applications. They will dive into alert fatigue.

The Achilles heel of IT Security Defensive Measures: Log File Manipulation by authorized personnel. "Trust is good but Verification is better"

This is part of my two-part blog series about HALOCHAIN technology. In my previous blog, I wrote about the introduction to SECUDE’s HALOCHAIN technology (Patent Pending) and how it will revolutionize the digital trading business. In this 2nd and final part of my blog, I will write about how system administrator holds the key to the company’s most critical data and how HALOCHAIN technology can be used to mitigate the risks related to log file manipulations.

Report Shows AEC Firms Face Greater Risk of Ransomware

The AEC industry is very familiar with good risk management. Whether it is managing safety risk, financial risk, legal risk, or project risk, AEC firms are adept at identifying, prioritizing and mitigating risk. Today, the risk of ransomware seems high, with a steady stream of news stories about the latest company to fall victim to an attack. But is it high for everyone in every industry?

Developing Secure Web Applications: 6 Best Practices

When businesses think about maintaining cybersecurity, the first thing that comes to mind is often endpoint and network security. However, web application security is becoming increasingly important. There have been numerous high-profile attacks on web applications in recent years; in 2020, for instance, the Twitter accounts of famous people were compromised as part of a bitcoin scam.