Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Crypto and phishing - how criminals are cashing in

Over the past several years, crypto has become increasingly mainstream. Research has predicted that by the end of 2022, the number of US adults who own at least one cryptocurrency will increase by 19% to 33.7 million. This equates to 12.8% of the population. Naturally, cybercriminals have quickly learned how to cash in on this popularity.

Protecting the Modern Healthcare Industry Requires Human Expertise and Innovative Partnerships

Protecting healthcare-related data requires a special level of technological and human support where the two support and interact with each other in harmony. Trustwave delivers this protection through its integration with Microsoft Azure Sentinel Security Information and Event Management (SIEM) solution allowing healthcare organizations to focus on caring for their patients while we protect their environment.

The One-Stop Kubernetes Security Checklist

Securing your Kubernetes environments may seem daunting at first, given how many different parts must be individually protected. Still, with the proper organization, you can make Kubernetes security much simpler and more effective. We’ve put together a complete Kubernetes security checklist of best practices and security recommendations to help you keep track of your progress. To make this a little easier, we’ve divided this checklist into the following sections.

Why You Need to Ditch Passwords, Private Keys, and All Other Forms of Secrets

Despite the steady drumbeat of news stories on security breaches caused by compromised credentials, 70% of teams still use secrets such as private keys or passwords to grant infrastructure access. In this webinar, we’ll cover why all forms of secrets are bad for you and your business, and why MFA is not good enough. We'll cover how the adoption of Passwordless Authentication and related hardware technologies like TPMs and HSMs fix a slew of problems, including making phishing attacks a thing of the past.

NC Protect advanced data protection for secure government, defense & supply chain collaboration

Empower your agency to take advantage of all the productivity and collaboration capabilities the Microsoft 365, Teams and SharePoint Server have to offer with zero trust ABAC powered information security from NC Protect.

A 7-Step Process for Strategic Risk Management

Modern-day enterprise risk management (ERM) is a disciplined, organization-wide approach to identifying and addressing a wide range of enterprise risks, such as operational risk, financial risk, compliance risk, and strategic risk. Organizations with robust ERM programs can better manage and mitigate risk and minimize the potential for losses or damage. ERM incorporates different strategies, tactics, and plans for each type of risk because those risks affect the organization in different ways.

AuthPoint MFA Recognized for Optimal Performance and Competitive Price Offer

WatchGuard and Miercom, an independent organization focused on product testing, have worked together on testing three MFA solutions to assess performance and cost effectiveness, as well as user and admin experience. AuthPoint MFA was tested competitively with two similar solutions: Cisco Duo and Azure MFA.

Security use cases: The key to test the readiness of your SIEM solution

Organizations have started considering cybersecurity as a top priority lately. The amount of money invested in IT infrastructure is increasing at an exponential rate. Further, dedicated teams are formed to monitor and optimize the performance of the different solutions that each organization has in its environment. Similarly, when it comes to cybersecurity, it’s become essential to evaluate and quantify the security posture of every organization.