Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Data Protection Officers and Their Key Responsibilities

Data breaches, cyberattacks and misuse of personal information are severe threats challenging the privacy of customer’s data, they can not only damage a company’s reputation but can also lead to heavy fines if compromised. To overcome these challenges, data protection laws are established. Data protection laws safeguard personal information and establish important guidelines on collection, storage, processing, sharing and disposal of personal data.

Rubrik powers Okta with critical user context to safeguard against identity attacks

Identity-based cyber attacks continue to prevail and impact organizations. Stealing credentials was the top initial action in breaches, according to Verizon. Plus, 84% of identity stakeholders surveyed said identity-related incidents directly impacted their business, resulting in reputational damages, distraction from core business, and increased recovery costs.

Multi-Region Redundancy for Stronger Data Resilience

Rubrik Cloud Vault already provides a high level of cyber resiliency against data deletion, encryption, and exfiltration through air-gapped, immutable, access-controlled backup and archival copies stored in an isolated environment. Now, for added resilience against regional failures and natural disasters, Rubrik Cloud Vault supports Zone-redundant storage (ZRS) and Geo-redundant storage (GRS), complementing our existing Local-redundant storage (LRS) option.

10 Essential Guidelines For Enterprise-Ready AI Solutions

AI-powered solutions are becoming increasingly prevalent in enterprise environments, leading to a new trend in procurement: the need for comprehensive AI governance frameworks. This shift reflects a growing awareness of AI-specific risks and the need for more granular controls. As the founder of Nightfall AI, a startup building AI models for data security, I've navigated hundreds of procurement cycles and observed a rise in AI-specific requirements.

Automatic Deprovisioning of users for Okta IdP

Splunk has implemented SCIM (System for Cross-domain Identity Management), a standardized protocol designed for efficient and secure management of user identities across various systems. With the release of this feature, Splunk customers can automatically deprovision users within Splunk when a user(s) are removed from the customer’s Okta Identity Provider (IdP) with following benefits for the customers.

Netskope Threat Labs Uncovers New XWorm's Stealthy Techniques

XWorm is a relatively new versatile tool that was discovered in 2022. It enables attackers to carry out a variety of functions, which include accessing sensitive information, gaining remote access, and deploying additional malware. The multifaceted nature of XWorm is appealing to threat actors, as evidenced by its alleged use earlier this year by threat actors such as NullBulge and TA558. Through Netskope Threat Labs hunting efforts, we uncovered XWorm’s latest version in the wild.

What We Know So Far About Zero-Day CUPS Vulnerabilities: CVE-2024-47176, CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177

On September 26, 2024, security researcher Simone Margaritellidisclosed the details of four OpenPrinting Common UNIX Printing System (CUPS) vulnerabilities, that, when chained together, can allow malicious actors to launch remote code execution (RCE) attacks on vulnerable systems. CUPS is a widely used, open-source printing system that supports Linux and other Unix-like operating systems. It also supports ChromeOS and macOS.

The Growing Threat Of Fake Job Applicants

It cannot be denied that the rise of remote work has opened up many opportunities for both employers and job seekers. Despite this, however, it has also presented a plethora of challenges when it comes to recruiting in the cybersecurity and tech spaces, one of the most notable of which is the proliferation of candidates who either don’t exist entirely or who aren’t who they claim to be.

Data Security Best Practices for Cloud CRM Systems as Adoption Surges

For the past few years, the CRM market has witnessed steady growth and it is projected to reach $89 billion by 2024. Estimates are that this growth will continue into the foreseeable future. Essentially, CRM systems have come to stay and have become the backbone of many organizations. However, the bleak state of cybersecurity cuts across many industries, and CRM systems are equally vulnerable.

How To Ensure Data Integrity

You can ensure data integrity in your organization by enabling data encryption, investing in a password manager, regularly backing up your data and implementing strict access controls. Data integrity ensures that your data is accurate and complete, meaning it hasn’t been changed, removed or stolen by an unauthorized user. Continue reading to learn why data integrity is important and how your organization can ensure your data is accurate, complete and consistent.