Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

If you don't know about HTTP Archive's Web Almanac yet, you should!

Most, if not all, of us in the software development space have benefitted from community-driven projects at some point. We’ve tapped into open source libraries, searched for advice on Reddit, and posted our seemingly unsolvable questions on Stack Overflow. But you might be missing out on a community project that especially excites me. It’s the Web Almanac, a collaborative report that provides tons of valuable insights into how people build and use the web.

SOAR in Seconds - Playbook Building with Natively Integrated SIEM and SOAR

In Splunk SOAR 6.3, SOAR features now come fully integrated with Splunk Enterprise Security 8.0. In this demo, see how to easily create a Splunk SOAR playbook in the context of your SIEM workflows. Playbooks and actions are now directly integrated within the Splunk Enterprise Security analyst queue. You can run playbooks and see the results without leaving the Splunk Enterprise Security interface. Both a Splunk SOAR and Splunk Enterprise Security license is required.

What to look for in Cloud Security

Cloud computing is changing how companies handle their data, providing unparalleled scalability and flexibility. Gartner predicts that by 2025, 85% of businesses will primarily use cloud services. But this change also brings in associated security risks. The 2023 Cloud Security Report by Cybersecurity Insiders found that 93% of companies are concerned about security risks in the cloud. As more businesses move to the cloud, making sure they have good security measures is very important.

$500,000 HHS Fine Underscores the Need for Security and Compliance in Healthcare

With the rise in cyberattacks and ransomware incidents, healthcare organizations face an increasing risk of data breaches that threaten patient privacy and HIPAA compliance. The recent $500,000 settlement between the US Department of Health and Human Services (HHS), Office for Civil Rights (OCR), and Plastic Surgery Associates of South Dakota highlights the critical importance of robust cybersecurity defenses in healthcare.

How Can FSOs Help with CMMC Compliance?

As of now, the final rule for the Cybersecurity Maturity Model Certification has been published. The clock is ticking for organizations to make the changes they need to make, adhere to the multi-phase schedule required to achieve certification, and continue their work with the federal government across the board. As organizations, both large and small, start to dig into this work, it becomes increasingly clear that certain individuals and roles are critical to have on hand.