Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Nightfall AI selected as 2024 SC Awards Finalist

Nightfall AI has been recognized as a 2024 SC Award finalist in the Trust Award categories for Best Data Security Solution and Best Insider Threat Solution. Celebrating its 27th year, the SC Awards recognize the solutions, organizations, and individuals that have demonstrated exceptional achievement in advancing information security.

The Impact of Cyber Events on Patient Care

Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. In each installment, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and where they see the sector going next. This is a must-listen for organizations and individuals looking to secure their data and achieve cyber resilience. We're excited to kick off a series of special episodes featuring highlights from the recent Rubrik Zero Labs Virtual Summit. This series offers a unique look into the critical conversations happening around data security.

What You Need to Know About the ISOO CUI Registry

We’ve written a lot about various security frameworks, from CMMC to ISO 27001, and throughout all of them, one of the core elements is the need to protect CUI. Information that is controlled at a very high – SECRET, Classified, or other – level is tightly bound by specific rules and can only be handled by select individuals. Completely base, public information is freely available and completely uncontrolled. But there’s a lot of information somewhere in the middle.

The Role of Network Forensics in Identifying Threats

The outlook of cyber threats in this modern cyber warfare theater has changed a great deal. Annually, 60% businesses drop victims to data breaches and cyber-attacks. Security teams intrinsically find themselves in a scenario whereby they lack visibility and control of the network traffic and are incidentally unable to detect and respond in real-time. To this regard, modern cybersecurity strategies now incorporate network forensics into their arsenal of defenses.

Threat Hunting for macOS - Webinar

MacOS environments are increasingly becoming targets for sophisticated cyber attacks. This webinar delves into advanced threat hunting techniques within macOS, focusing on the utilization of MUL (macOS Unified Logging) events and comprehensive system telemetry. We look at macOS data sources to uncover hidden threats and enhance detection capabilities.

Designing Secure and Private Software by Default with Chris Romeo from devici

The current state of application security often leaves us reacting to data breaches and unauthorized disclosures well after they have occurred. How do we change this reactive reality? In this webinar, we’ll discuss this and other questions: By adopting these principles, development teams can shift from a reactive to a proactive stance, ensuring their software products are robust, trustworthy, and aligned with the highest security standards.

ASPM and Modern Application Security

Gartner’s 2024 Hype Cycle for Application Security is making the rounds, and Application Security Posture Management (ASPM) continues to climb up and around the famous curve, from the Peak of Inflated Expectations in 2023 to this year’s slide towards the Trough of Disillusionment. That’s pretty fast movement for a technology that we haven’t yet succeeded in clearly defining!