Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Exploring the Risks of Read-Only Access in the Cloud

My career began with read-only access. In my first job, I worked night shifts in a data operations center. Our team handled incidents identified either by monitoring or from end customers. This meant I often had to perform first, second and third-line troubleshooting. If we couldn’t identify and resolve the issue, our only option was to wake up a rather exhausted escalation engineer.

Three reasons to invest in an ASPM solution in 2024

The pace of software development is astounding! The transition to agile, DevOps, cloud, and the supercharged use of AI is empowering distributed development teams to build software with greater speed and autonomy. In contrast to the remarkable strides in development methodologies, maintaining a robust security posture has become a formidable challenge. AppSec teams are still playing catchup, both outnumbered and out-resourced.

Protecting Sensitive Data with Egnyte in Today's Threat Environment

In light of recent attacks against on-premises file server appliances affecting organizations of all sizes and industries, it has become clear that, in many cases, companies would be better suited to choosing cloud solutions for their secure data management needs. There are many great products on the market capable of providing easy access to files persisted in your local network.

Cloud Threats Memo: Extracting Training Data from Generative AI Language Models

This year will probably be remembered for the revolution of ChatGPT (the website was visited by 1.7 billion users in October 2023, with 13.73% of growth compared to the previous month) and for the widespread adoption of generative AI technologies in our daily life.

The complete guide to compliance risk management

To build a successful business you’ll need to acquire new customers, save on costs, and avoid major pitfalls that could impact your bottom line. An important aspect of this is managing your organization's compliance risk. These include the risk of penalties, legal judgments, and other issues that could come as a result of not complying with legal regulations and industry standards.

What Are Dark Web Scans?

Dark web scans, also known as data breach scans, are scans that let you know if your personal information, such as your email and login credentials, is on the dark web. There are several free and paid dark web scans available online to use and each of them works differently. Continue reading to learn what the dark web is, how dark web scans work and how to initiate a dark web scan.

The Winter Wonderland of Cyber Threats

It’s the season for mince pies, tinsel and, of course, holiday shopping. I am in the Middle East so temperatures are quite pleasant for a mall stroll while shopping for family gifts, but it’s certainly odd hearing Mariah Carey being played and seeing fake snow on Christmas trees when it’s 25 degrees outside. While I prefer to do my shopping in person, around the world the majority of festive shopping happens on mobiles and laptops.

3 Levels of FISMA Compliance: Low Moderate High

The United States enacted the Federal Information Security Management Act (FISMA) in 2002 as part of the E-Government Act of 2002 to enhance the administration of electronic government services and operations, and since has been amended by the Federal Information Security Modernization Act of 2014 (FISMA 2014). This law requires federal agencies to develop, implement, and maintain an information security program to protect the sensitive data they handle.

Anheuser-Busch Distributor, Ben E. Keith, Network Breach Update

Ben E. Keith Company (BEK) is a food and drink distributor that serves over 62 Texas counties and 15 states. They are a service provider for Anheuser-Busch products, providing everything from craft and import drinks to steaks and sugar. In October, BEK announced a possible data breach of their network information, but further details required an investigation. Their investigations have presumably ended, as a notice for the event has recently appeared on the Texas Attorney General’s website.