Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

SOAR in Seconds - Playbook Building with Natively Integrated SIEM and SOAR

In Splunk SOAR 6.3, SOAR features now come fully integrated with Splunk Enterprise Security 8.0. In this demo, see how to easily create a Splunk SOAR playbook in the context of your SIEM workflows. Playbooks and actions are now directly integrated within the Splunk Enterprise Security analyst queue. You can run playbooks and see the results without leaving the Splunk Enterprise Security interface. Both a Splunk SOAR and Splunk Enterprise Security license is required.

What to look for in Cloud Security

Cloud computing is changing how companies handle their data, providing unparalleled scalability and flexibility. Gartner predicts that by 2025, 85% of businesses will primarily use cloud services. But this change also brings in associated security risks. The 2023 Cloud Security Report by Cybersecurity Insiders found that 93% of companies are concerned about security risks in the cloud. As more businesses move to the cloud, making sure they have good security measures is very important.

$500,000 HHS Fine Underscores the Need for Security and Compliance in Healthcare

With the rise in cyberattacks and ransomware incidents, healthcare organizations face an increasing risk of data breaches that threaten patient privacy and HIPAA compliance. The recent $500,000 settlement between the US Department of Health and Human Services (HHS), Office for Civil Rights (OCR), and Plastic Surgery Associates of South Dakota highlights the critical importance of robust cybersecurity defenses in healthcare.

How Can FSOs Help with CMMC Compliance?

As of now, the final rule for the Cybersecurity Maturity Model Certification has been published. The clock is ticking for organizations to make the changes they need to make, adhere to the multi-phase schedule required to achieve certification, and continue their work with the federal government across the board. As organizations, both large and small, start to dig into this work, it becomes increasingly clear that certain individuals and roles are critical to have on hand.

Navigating User Account Management for Enhanced Windows Security

Your network is comprised of devices and users, and both require proper management. For a user to access a device and its hosted assets, that user requires a user account that has access to the computer. The allocation and management of these accounts are important for multiple reasons including security, personalization and accountability.