Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Telemetry Data: Examples & Types of Data Collected

Telemetry data automatically collects and sends data from various devices to a central location for analysis and monitoring. However, not all data is created equal. To better understand data telemetry and how to leverage it, you also need to understand the different types of data telemetry. This article will discuss various telemetry data examples and types to help you better understand the topic.

Protecting Student Health Data: TPRM for Higher Education

Higher education institutions are a growing target for cybercriminals due to the high volume of sensitive information and data they collect and use. From enrollment to matriculation, colleges and universities utilize student data for everything from financial aid packages to determining eligibility for coursework. According to a report by Check Point Research, the education sector (specifically higher education) has experienced significantly more cyber attacks than any other industry in recent years.

Obrela Digital Universe Report Reveals Most Common Cyber Security Attacks, And Sectors Most Affected

Ransomware attacks increasingly targeting critical infrastructure, the financial sector, healthcare and educational institutions. Less-protected third-party partners with privileged access increasingly targeted.

Building Trust and Engagement: Mobile App Security for the Modern User

In today's fast-paced digital world, the focus is on creating secure and frictionless mobile applications that prioritize user privacy. This balance is particularly critical when dealing with in-app subscription management, a key revenue source and a hot spot for user data interaction. Proper management of these subscriptions is crucial for both securing continuous revenue and ensuring user trust alongside compliance with strict data protection standards.

Detecting and Preventing Reconnaissance Attacks

In 2024, every business across the world is already aware of the looming potential of a cyber attack. With billions of dollars pouring into the cyber criminal market each year, hackers have more backing to create large-scale attacks, breaching financial records, private data, and customer information. Reconnaissance attacks are the first step in many of these major breaches. By scouting out a business, collecting information about its security posture, and aiming to identify vulnerabilities, these initial attacks give hackers the data they need to launch precise, damaging attacks.

Top Security Data Types: Exploring the OCSF Framework

In cybersecurity, it’s a big challenge to handle diverse data formats across various platforms. The Open Cybersecurity Schema Framework (OCSF) aims to address this by standardizing data security formats and simplifying the process of threat hunting. Major players like IBM, AWS and others are working together to standardize data with this open-source project, emphasizing its importance.

5 pre-built workflows created and shared by Tines users

At Tines, we're super proud of our library. Featuring hundreds of pre-built workflows, it's an incredibly useful source of inspiration for Tines users, from newbies right up to advanced builders. This week, the library reached two major milestones - it now contains 750 pre-built workflows, 75 of which were submitted by Tines users.

What is a Time Theft and How to Prevent It

Time theft happens when employees dishonestly use their paid work hours for personal activities or tasks unrelated to work. Time fraud significantly impacts an organization’s productivity, business strategy, finances, and employee morale. To keep a high-performing work environment, companies must combat time theft.

How to Talk to The Board About Exposure

Exposure management tooling can act as an excellent source of truth for cybersecurity leaders as they communicate risk up to the board level. The visibility and data streaming from exposure management solutions makes it easier for CISOs to track security performance over time, quantify improvements in security maturity levels, establish better financial quantification of cyber risk and ensure the organization's exposure levels match up with industry averages.

CVE-2024-3094 - Critical Backdoor Vulnerability In XZ Utils Open-Source Library

CVE-2024-3094 is a critical backdoor vulnerability found in the XZ Utils open-source library. The vulnerability was caused by a malicious code injected into the library by one of the maintainers. The vulnerability allows remote attackers to execute any desired code on systems with exposed SSH packages.