Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

SharePoint and Office 365 compliance & data classification with cp.Discover

Discover, Classify, and Protect your most Sensitive data. Find critical data in local and remote file shares such as Microsoft SharePoint, Office 365, AWS or Azure and create custom sensitive data rules to locate and classify intellectual property and other sensitive data specific to your business.

Riscosity Overview

Riscosity Helps Enterprises understand who are their actual Software Vendors. The revenue generating software powering most enterprises, uses 3rd party computer code - called components - sourced from many different companies. Riscosity builds a real time catalog of all these components, and identifies what data is being exchanged with these vendors and helps secure them and reduces any legal liabilities as a result of failed audits or findings.

3 must-dos for IT admins in healthcare organizations to secure patients' data and privacy

Since the beginning of the pandemic, there has been an increase in the volume of sensitive patient data being stored and processed by healthcare organizations. A patient’s health history, including all the treatments, procedures, prescriptions, lab tests, and scan reports, are stored in the form of electronic health records (EHRs).

Stories from the SOC - Powershell, Proxyshell, Conti TTPs OH MY!

In the second half of 2021 the AT&T Managed Threat Detection and Response (MTDR) security operations center (SOC) observed an increasing number of attacks against vulnerable Exchange servers. A number of these attacks were attempting to leverage proxyshell vulnerability to gain access to customer’s networks.

Snyk IaC wins 2021 CRN Tech Innovator Award & continues to grow channel business

There’s never a dull moment at Snyk and for our Channel team that it’s been especially rewarding. We’re very excited to say that this week Snyk Infrastructure as Code (Snyk IaC) was named the winner of the cloud security category for the 2021 CRN Tech Innovator award. The full list of winners, unveiled earlier this week, showcases innovative vendors in the IT channel across 47 different technology categories, in key areas ranging from cloud to storage to networking to security.

Scanning ARM templates for misconfigurations with the Snyk CLI

Managing application resources at scale can be tricky business. As such, many DevOps and AppSec teams turn to using a declarative framework rather than writing individual scripts to deploy, manage, and maintain access controls for their resources. For Azure environments, Azure Resource Manager (ARM) is this management layer that allows teams to manage their infrastructure as code (IaC) through declarative ARM templates.

Arctic Wolf Continues on Explosive Growth Trajectory

This week marks our mid-year kick-off. It’s our all-company meeting that, like Arctic Wolf, gets bigger each year with hundreds of new team members joining us from around the world—many for the first time. With so much new hiring (we’re on pace to nearly double ourselves, again), I’m continually reminded of our Wolf Pack’s talent, dedication, and drive for success, and I’m proud to work alongside these professionals daily.

Detect & Mitigate Your Ransomware Risk with Egnyte

In this video, Egnyte’s Chief Governance Officer Jeff Sizemore & Senior Manager of Governance Marketing Neil Jones discuss recent trends in ransomware detection and how you can mitigate potential attacks. A brief demo is provided at the end, where you will learn how to recover from a ransomware attack. Ransomware attacks continue to proliferate. We want users to understand the current state of ransomware attacks and to be able to prepare for attacks and manage them more effectively.