Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Authenticated | Arctic Wolf

In the first episode of Authenticated, Arctic Wolf Chief People Officer Dan Schiappa and Arctic Wolf Research and Development VP Daniel Thanos, detail the unique opportunity that Arctic Wolf Labs has to help reduce alert fatigue for security practitioners, serve the public good, and lead the industry in innovation by combining leading-edge AI with human intelligence.

How To Respond To Tough Questions From Leadership Teams Faster and Better

Have you ever been asked difficult questions from your leadership teams that you couldn’t answer? How do you intelligently and succinctly respond to the following questions and have the supporting data to back up your metrics and business outcomes? Regardless of your role in compliance, risk management or information security, these questions can potentially trigger a mild case of anxiety or even a full on panic attack, depending on your organization’s level of control maturity.

Decentralized Clinical Trials: What Biotechs Need to Know

The buzz around decentralized clinical trials, or DCT, has captured the attention of organizations across the clinical research industry, prompting no small degree of excitement, apprehension, and speculation. DCT has some in the industry cheering, some biting their nails, and others scratching their heads. But what exactly does DCT mean—and will it truly change clinical research?

Exploit vs. Vulnerability: What Is the Difference?

Whenever engineers discover a new security issue, the question arises every time: is this an exploit or vulnerability? What is a software vulnerability? How does it differ from an exploit? A vulnerability is a gap in the armor or weakness that allows people to enter. The exploit is the mechanism that someone uses to get in. For example, a door with a fragile lock has a vulnerability. The exploit uses the keys, hammer, or lockpick to break the lock.

GDPR & HIPAA Compliance- Mapping the Similarities and Differences

Is your organization looking to achieve both HIPAA and GDPR Compliance? Well, believing that achieving compliance with one will automatically ensure compliance with the other regulation isn’t really true. So, based on this notion, if you are looking to achieve compliance with both HIPAA and GDPR, then here is an interesting webinar video that you should watch to get clarity on this aspect.

Brace Yourselves: OV Code Signing Certificate is Changing from November 15, 2022

Cyber perpetrators don’t leave a single stone unturned when discovering security loopholes, no matter how thin their chances of success are. That’s why authorities such as CA/B Forum must stay a step ahead, tighten their policies and minimize security breaches. One such change is occurring from November 15, related to OV Code Signing Certificates. From November 15, 2022, OV code signing certificates will require a hardware security module to store their private key.

What Is the Average Cost of a Data Breach in India?

According to the IBM Security Data Breach Report of 2022, India's average data breach cost is at a record high of Rs 17.6 crore (Rs 175 million, which is around $2.2 million) for the fiscal year of 2022. This is a 6.6% increase from last year's Rs 16.5 crore and an uptick of 25% from the average cost of Rs 14 crore in 2020, as stated by IBM analysts.

What are the best practices in Digitizing Customer Onboarding? What are the technologies involved?

A new client’s onboarding in banking might take days of information gathering, application completion, identity verification, printing or emailing, and waiting for the consumer to sign and return the paperwork. Every day that goes by, increases the likelihood that the consumer may become impatient and discover more rapid competition. Additionally, manual paperwork attracts errors that contribute to costs and delays.