Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Detect Fraud Sooner with the Splunk App for Fraud Analytics

It will not come as a surprise to you that fraud and financial crime is continuing to challenge organizational business and cyber resiliency plans. Odds are you have dealt with fraud firsthand, or know someone experiencing the pains caused by fraud. Back in 2020 we shared some thoughts about how we believe leveraging a data platform like Splunk can help you gain more anti-fraud value and insights from your data and showed how you can determine what your data is worth.

Covered Entities vs Non-Covered Entities Under HIPAA

The Health Insurance Portability and Accountability Act (HIPAA) was enacted in 1996 and sets forth a comprehensive set of standards for protecting sensitive patient health information. The Privacy Rule applies to all entities that fall within the definition of a “covered entity“, which generally includes healthcare providers, health plans, and clearinghouses.

What DNS over HTTPS (DoH) Is & How to Enable in Windows 10

When your web browser accesses a website, it needs to first translate the friendly URL (such as Netwrix.com) to the public server IP address of the server that hosts that website. This is known as a DNS lookup. Traditional DNS is unencrypted, unlike modern HTTPS web traffic that’s almost entirely secured via HTTPS these days.

Unifying Construction Documents with Procore and Egnyte

It is not uncommon on the job site to find project teams using a variety of disparate applications to access, share and collaborate on documents - each with their own storage, permissions and controls. This makes it very challenging to manage that project information, as it flows in and out of teams, and across different software platforms.

Top Collaboration Challenges In Clinical Trial Outsourcing

For biotech organizations, collaboration is the lifeblood of clinical research. A typical clinical trial depends upon constant communication, data sharing, and myriad other interactions among sponsors, sites, CROs, and participants. A breakdown in collaboration can cause delays that threaten the entire operation.

10 Years of Netskope, 10 Years a CISO

2012 was an interesting year. In the UK it was all Olympic Games and Golden Jubilees, while in the US, Barack Obama was reelected for a second term. The Mayan calendar came to an abrupt end—but the world did not—and we saw the final flight of NASA’s Space Shuttle. Amid all this, someone found the time to start up a new tech venture—a company anticipating massive transformation in networks, cloud, and cyber security. That company was Netskope.

Securely Managing Your Audit Logs with Teleport and Snowflake

One of the most important features Teleport has to offer is that it centralizes all of your infrastructure’s audit logging into one central place, mapping every query, every command and every session to an individual user's identity. As you hire more engineers and resources scale, it can become increasingly difficult to manage all of this log data. Luckily Teleport’s extensibility makes this log data extremely easy to format, export and monitor all in a secure, event-driven way.

It's time to change the playbook: Prepare for uncorrelated surprises

Investors came into 2022 feeling good, with a three-year average annual return for the S&P 500 of 24%. In March, things changed. The Federal Reserve raised interest rates, signaling it was time to switch to bonds. The playbook said bonds were the much safer play. Then Russia invaded Ukraine. Commodity prices, especially energy and food, spiked. Supply chains broke. The E.U. faced a winter without enough energy to heat homes or power businesses.

A Guide to Open Source Intelligence (OSINT)

Open-source intelligence (OSINT) is essentially any information that can be obtained from publicly available sources. The practice of collecting this information is not new; in fact, in the early 1990s, the Deputy Director of the CIA asserted that over 80% of CIA analysis came from open-source information. Maps, phone books, printed materials, news reports, and other forms of content can provide a lot of information if one knows where and how to look.