Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Five worthy reads: Keeping a close eye on cybersecurity while working remotely

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we highlight the importance of creating and enforcing a solid cybersecurity strategy for employees who work remotely.

Computer Forensic Tools - Providing The Evidence You Need

If you are even considering investigating an employee or monitoring employees in general, consider modern computer forensic tools for a complete solution. Computer forensic tools allow an employer to gather digital evidence before confronting an employee. With the Covid-19 (Coronavirus) outbreak, these types of solutions can also help to monitor employees that are self-quarantined or voluntarily working from home.

Assess and adapt for resiliency

Admittedly, we are in uncharted territory – what seemed routine a few short weeks ago – commuting to work, going to the gym, or gathering with friends – is now either a daunting task or a non-existent option. This shift has impacted our technology, our workforce, and our business environments almost overnight and with minimal warning.

Hardening Windows security: How to secure your organization - Part 1

The cybersecurity threat landscape is quickly changing. Administrators have become more cautious when it comes to security and governing access, end users have become tech-savvy and security-aware, and attackers have also raised their game. Living-off-the-land attacks, or LOTL, is one clear trend today, with attackers exploiting preinstalled features and default tools built into system.

Securing Tekton pipelines in OpenShift with Sysdig

In this blog post, you’ll learn how to create a reusable Sysdig Secure image scanning task, for Tekton pipelines and Openshift clusters, that can be deployed in many pipelines. As a DevOps engineer, you want to deliver applications fast but keeping compliance with security standards like CIS, PCI DSS or NIST 800-190, GDPR can be an arduous task. You might implement image scanning in your CI/CD pipelines to detect and resolve issues such as known vulnerabilities and incorrect configurations.

COVID-19 Guide for Security Professionals

What a world! In February, everyone was busy minding their own business, but since March, the entire globe suddenly focused on the same challenge. The COVID-19 pandemic has taken our businesses and private lives by storm. The outbreak surprised everyone - a surprise hardly any business was prepared for. It brought country-wide lockdowns for quarantine, office closures and enforced teleworking, which are now commonplace.

Top 5 security challenges with Zoom video conferencing

In times when a majority of employees are working from home due to the global coronavirus pandemic, enterprises are extensively relying on collaboration tools like Zoom to keep their employees productive and engaged. Only in March, the daily usage of Zoom Videos increased over 5 times. The platform made it easy for company employees and clients to hop on meetings whenever needed and for schools and students to continue education online.

BitSight vs Whistic Comparison

Outsourcing, digitization, and globalization are three of the largest trends in the last 30 years. They've brought new products and services, increased specialization, lower costs, and improved access. But they've also introduced significant cyber risk. Particularly the risk of data breaches and data leaks. For perspective, a recent study by the Ponemon Institute put the average cost of a data breach at $3.92 million. The unfortunate truth is third-parties cause a lot of data breaches.

SecurityScorecard vs Whistic Comparison

Outsourcing, digitization, and globalization have brought us new products and services, allowed for increased specialization, lowered costs, and improved access but they've also introduced significant cyber risk. Particularly the risk of data breaches and data leaks. And with the average cost of a data breach reaching close to $4 million dollars according to a recent study by the Ponemon Institute, it pays to prevent them. The unfortunate truth is third-parties cause a lot of data breaches.

CyberGRX vs Whistic Comparison

The amount of cyber risk the average organization is taking on has never been higher, a big part of it in the form of third-party and fourth-party risk. A household name reporting a data breach or data leak feels like a daily occurrence. And with the average cost of a data breach reaching close to $4 million dollars according to a recent study by the Ponemon Institute, organizations are looking for new ways to prevent them. The unfortunate truth is third-parties cause a lot of data breaches.