Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

CrowdStrike Congressional Testimony: 5 Recommendations to Secure the Public Sector

“We are at a point where the stakes of defensive stagnation pose increasing risks in the face of threat actors’ innovation. This is why it’s so important to continually evolve in how we prevent, detect, and respond to cyberattacks.” This excerpt from my recent testimony to Congress underscores the greatest challenge facing public sector organizations today.

Keeper Unveils New UI for a More Intuitive Customer Experience

The Keeper Vault has an updated look with modern styling for a friendlier and more intuitive user experience. In addition, Keeper’s upgraded User Interface (UI) offers clearer distinctions between elements, as well as enhanced clarity and navigation, improving usability and accessibility.

What Is Kubernetes Admission Control?

Kubernetes admission control is a mechanism that validates and modifies requests to the Kubernetes API server before they are processed. Admission control can enforce policies, security rules, resource limits, default values and other elements of the cluster’s use. This mechanism can also reject requests that violate certain rules or conditions.

What is the Computer-Security Incident Notification Rule?

The Computer-Security Incident Notification Rule requires US federal banking organizations and banking service providers to notify the Office of the Comptroller of the Currency (OCC) that a cybersecurity incident has occurred. The bank must ensure that the OCC receives this as soon as possible and no more than 36 hours after the incident has occurred.

What is NIST 800-161? Guide & Compliance Tips

NIST 800-161 — also identified as NIST Special Publication (SP) 800-161 — was published in April 2015 as Supply Chain Risk Management Practices for Federal Information Systems and Organizations. In May 2022, a year after President Biden’s Executive Order on Improving the Nation’s Cybersecurity, NIST produced a revised version, NIST 800-161 rev. 1 Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations.

Blue Shield of California Suffers a Data Leak Through Vendor Fortra: Over 63,000 Exposed to Breach

Blue Shield of California is one of the largest healthcare providers in the state of California. The health insurance company is nonprofit and delivers insurance to Californians all over the state. Hundreds of thousands of residents rely on the provider for their health insurance, and they trust the company with vast amounts of personal and health information.

How to Assess and Improve Your Cybersecurity Posture

As an enterprise leader or cybersecurity professional, you know that the threat landscape is expanding. You know that cybercriminals get smarter every day, using ever-more sophisticated weapons to attack organizations, disrupt operations, and compromise sensitive IT assets. To protect your organization from these attackers, you must assess and strengthen your cybersecurity posture. In this blog we’ll show you how to do both.

Penetration Testing | Finding Skeletons Make You Stronger

Are you conducting regular penetration testing on your organization's security measures? If so, you might be missing out on a crucial step that could make you even stronger. In this video, cybersecurity expert Megan Brown shares her insights on why it's essential to proactively seek out and address any potential gaps in your security measures. As Megan explains, knowing where the bodies are - where the bones are buried - can help you identify areas of weakness and take action before they become a major issue. So why wait until it's too late?

Real-time co-editing on desktop using native Google Workspace tools

With deep integrations into Google Workspace, Egnyte enables users to streamline the document creation process by delivering a seamless experience to create, co-edit and share documents directly from within the Egnyte Desktop App and Web UI. By using Egnyte as the document source, files are also protected from internal misuse and external threats, ensuring that users can collaborate with confidence, without concerns of exposing sensitive data.

What is a Cross-Site Request Forgery (CSRF) Attack?

Successful hackers have the ability to find a specific vulnerability and turn it into millions of dollars if the account is large enough. Good hackers keep it simple by using the browser as a means to attack unwitting users. Cross-site request forgery, commonly called CSRF, is an innovative attack method in which hackers use header and form data to exploit the trust a website has in a user’s browser.