Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Cloud Compliance Best Practices: A Quick Overview

Cloud compliance is more important than ever, especially as businesses and organizations continue to engage in remote and digital work practices due to COVID-19. Even before the pandemic, more and more companies were migrating to the cloud. But what exactly is cloud compliance, and what are some best practices you should keep in mind if you’re shopping for a provider or looking to enhance your current computing system?

Egnyte and Splunk Integration: You Can't See if You Don't Look

Security Information and Event Management (SIEM) technology provides visibility across an organization's information security systems by collecting and correlating events from logs across many different sources. Security analysts use tools like a SIEM to go “threat hunting”. By correlating disparate events across systems, they can often detect Indicators of Compromise (IoC’s) that may otherwise go unnoticed on individual systems.

Mitigating Insider Threats: Plan Your Actions in Advance

For any organization, insider attacks are like a severe illness: prevention is better than the cure. Like illnesses, insiders mask their malicious actions and can harm your organization for a long time before you detect them. This harm can be in the form of a loss of data, customers, money, etc.   Planning a risk mitigation process helps to stop insider attacks at the early stages or reduce their potential damage.

The Future Federal SOC Will Be Data-Driven

The executive order on cybersecurity President Biden issued in May doesn’t radically change federal cybersecurity practices for now, but it lays the groundwork for significant changes in the future. The EO directs multiple federal agencies to develop new policies and processes to safeguard federal networks, and also to improve the overall cybersecurity posture of all Americans.

How to cyber security: Addressing security fatigue

Addressing security fatigue with small changes to your AppSec strategy can help you manage and minimize risks in your applications. How many times a day does something like this happen to you? Is it 10 times a day? 25? 100? I’m a highly technical security professional and I’m not even sure what I should do. What is PC-Doctor? What is SystemIdleCheck.exe? If I click No, will something not work the way that I want it to work? Each time you see such a prompt, what do you do?

Insider Threat Prevention: 5 Steps To Improving Defensive Posture By The End Of 2021

As businesses emerge from a pandemic year, cybersecurity concerns are necessarily top of mind . Companies face expansive cybersecurity threats on many fronts, prompting 75 percent of business leaders to view cybersecurity as integral to their organization’s COVID-19 recovery. They undoubtedly face an uphill battle. Surging ransomware attacks and increasingly deceptive phishing scams are attracting national attention, while more than 500,000 cybersecurity jobs remain unfilled in the US alone.

NIST vs SOC 2: What's the Difference?

When the subject is cybersecurity compliance, the National Institute of Standards and Technology (NIST) is often the first reference that comes to mind. NIST has been around for decades, and its standards for the development of cybersecurity risk management programs are considered the gold standard. There is, however, another standard that applies to service providers that handle customer data, as well as to those firms’ business partners: the SOC 2 audit.

Malware alert: The RedXOR and Mamba attacks and how to defend against them

Picture this: It’s a normal day of working from home as usual since the COVID-19 outbreak. After that satisfying cup of coffee, you log in. But something is wrong. No matter how many times you click, your files don’t open. Your screen is frozen and refuses to budge. And then, you see one of the worst nightmares any IT admin can imagine: “Oops, your files have been encrypted. But don’t worry, we haven’t deleted them yet.