Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Law Enforcement Collaboration Has Eastern-European Cybercriminals Questioning Whether There Is A Safe Haven Anymore

Through the active Dark Web research that Trustwave SpiderLabs conducts for its clients, we have observed new communications on various Dark Web forums between Eastern-European cybercriminals. Based on the conversations that we’ve collected, a segment of cybercriminals is now worried that the Russian authorities may be actively hunting them down.

Cloud Threats Memo: Hard Statistics About Poorly Secured Cloud Accounts

Cloud accounts continue to be a valuable target for cybercriminals: not only do the resources of a compromised IaaS environment grant an immediate profit for the attackers, but the same infrastructure also provides a trusted environment to launch attacks against other targets.

10 Ways to Reduce Cybersecurity Risk for Your Organization

‍Cybersecurity breaches have been on the rise, and it's expected that by 2023, they'll have grown to 15.4 million. While technological advancements have made it easy for organizations to upgrade their security measures, malicious hackers are now using sophisticated tools. This means that in addition to implementing strict cybersecurity policies, you also have to take proactive measures to reduce your cybersecurity risks.

Splunk Live Chat with The Hill: Cybersecurity Trends in the Public Sector

Join the LIVE cybersecurity discussion featuring: Topic: How cybersecurity in the public sector space has shifted over the course of the last year due to the introduction of cybersecurity legislation and federal agencies’ focus on Zero Trust as well as key federal certifications like FedRAMP and IL5.

WED2B Prevents Disruption From Ransomware Attack Using Rubrik

WED2B prevented disruption from a ransomware attack in November 2019, restoring critical SQL databases with Active Directory immediately. “With Rubrik, we experienced zero data loss, zero impact to our core business, we paid nothing in ransom fees and were up and running in 24 hours, which is fantastic” Rob Mole, Head of IT & Solutions.

The Cybersecurity Skills Gap: Myth or Reality?

Take a glance on social media on any given day, and we’ll hear from commentators stating how there is a (cyber) skills gap and that it must be addressed if we are to meet the challenges we are all increasingly facing. Let’s be clear about something before we continue. If we are saying that there is a skills gap, then there are organizations out there that are ready to hire cybersecurity professionals now.

CIS Control 14: Security Awareness and Skill Training

Users who do not have the appropriate security awareness training are considered a weak link in the security of an enterprise. These untrained users are easier to exploit than finding a flaw or vulnerability in the equipment that an enterprise uses to secure its network. Attackers could convince unsuspecting users into unintentionally providing access to the enterprise network or exposing sensitive information.

How Subcontractors Can Identify CUI Data in Google Workspace

The US federal government has increasingly focused on supply chain security in recent years, which puts added pressure on subcontractors to not be the weakest link. Due to the nature of federal contracts, government contractors typically possess data called Controlled Unclassified Information, or CUI, if they supply goods or services directly to the federal government.

Why the U.S. Government is scaling their cyber visibility practices with Elastic

Amid a growing network of endpoints to support telework and cloud-based applications, US federal civilian agencies are protecting government resilience and resources with a new Continuous Diagnostics and Mitigation Dashboard (CDM Dashboard) built on the Elastic search platform. At a recent MeriTalk Cyber Central: Defenders Unite event, participants learned about how Elastic, in partnership with ECS, enables security operations center (SOC) teams with cyber visibility at speed and scale.