Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Industry Watch: How the Pandemic is Changing Cybersecurity

The pandemic has touched virtually every aspect of life, and cybersecurity is no different. A new threat intelligence and cybersecurity status report from Microsoft shows how businesses around the world are changing their approach to cybersecurity to protect user data and systems as more and more teams work remotely. Here’s how the pandemic has changed cybersecurity, and what your business can do differently to protect your data as the situation evolves.

Secure Customer and Employee Data with Nightfall's Data Loss Prevention

It’s estimated that more than 27 billion records were exposed in the first half of 2020, despite the decrease in number of reported breach events from 2019. This trend of data breach events is becoming more severe with the average cost and size of a data breach increasing year over year. The severity of modern data breaches presents a serious risk to companies looking to protect the data of stakeholders such as customers and employees.

Protect credentials and secrets with Nightfall DLP

Sensitive data like credentials and secrets are in constant danger of exposure, and this is especially true in the cloud. Due to the highly collaborative and always-on nature of cloud services, they tend to be environments where security best practices are hard to enforce without either lots of time and effort or automated controls.

Logging of security events in SIEM

Effective logging of events and activities in an organization’s technical infrastructure exponentially boosts the capabilities of its SIEM solution. In this article, we explore how logs are leveraged in a SIEM solution. First off, log entries can be helpful for multiple purposes such as security, performance analysis, troubleshooting, etc. Considering the size of a modern enterprise’s IT technical infrastructure, monitoring the network alone is not a favorable approach.

Why Manually Tracking Open Source Components Is Futile

Open source is everywhere. Everyone is using it. Open source code is found in almost every proprietary software offering on the market and is estimated to make up on average 60%-80% of all software codebases in 2020. Why the proliferation? Open source libraries help developers write code faster to meet the increasingly shorter release cycles under DevOps pipelines. Instead of writing new code, developers leverage existing open source libraries to quickly gain needed functionality.

Digital Transformation - A key tenet of business resilience strategy in 2020

If 2020 were to be described in one word then I would call it unpredictable or uncertain. There was a time when hand-crafted was preferred but as the nature showed it real face; Un-touched by hands became highly appreciated. Amidst all these changes the businesses had to build a business resilience strategy. In the wake of the pandemic, business resilience strategies adopted by companies are the superheroes saving the falling GDP. They say the best angle to approach a problem is a Try-angle!

The Future of Work: Enabling the Not-so New Normal

At this point in the pandemic, you’re probably tired of everyone referring to remote working as “the new normal.” Large companies like Facebook, Google, and Twitter have already announced that they will be working from home until the end of 2020 at the earliest, or as far out as August 2021. So, if these companies are any indication, we will all still be working from home for the foreseeable future.

What Are Cloud Leaks?

It seems like every day there’s a new incident of customer data exposure. Credit card and bank account numbers; medical records; personally identifiable information (PII) such as address, phone number, or SSN— just about every aspect of social interaction has an informational counterpart, and the social access this information provides to third parties gives many people the feeling that their privacy has been severely violated when it’s exposed.

FireEye vs Fortinet for Continuous Security

How does the fourth-largest network security company by revenue hold up against the first cybersecurity firm certified by the U.S. Department of Homeland Security? Fortinet's appliances and next generation firewalls (NGFW) have made it a category leader in unified threat management (UTM); let's see how they stack up against FireEye's comprehensive suite of enterprise security solutions.

96% of Organizations Use Open Source Libraries but Less Than 50% Manage Their Library Security Flaws

Most modern codebases are dependent on open source libraries. In fact, a recent research report sponsored by Veracode and conducted by Enterprise Strategy Group (ESG) found that more than 96 percent of organizations use open source libraries in their codebase. But – shockingly – less than half of these organizations have invested in specific security controls to scan for open source vulnerabilities.