Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Forseti intelligent agents: an open-source anomaly detection module

Among security professionals, one way to identify a breach or spurious entity is to detect anomalies and abnormalities in customer’ usage trend. At Google, we use Forseti, a community-driven collection of open-source tools to improve the security of Google Cloud Platform (GCP) environments. Recently, we launched the “Forseti Intelligent Agents” initiative to identify anomalies, enable systems to take advantage of common user usage patterns, and identify other outlier data points.

Endpoint Security: It's a Whole New World

Once upon a time, endpoint security was just a hall monitor. It watched for known bad files identified with a simple signature and sent you an alert when the file was blocked. To be safe, it would scan every machine daily, an intrusive activity that slowed down machines and sped up the heart rates of affected users and hapless analysts at help desks.

What Is the CIA Triad and Why Is It Important for Cybersecurity?

Cybersecurity is aimed at protecting the company’s digital assets against the ever-growing cyber-attacks. Cybersecurity can be ensured by deploying appropriate security controls to provide several security features such as deterrent, prevention, and detection of cybercrimes. The main purpose of cybersecurity is to ensure Confidentiality, Integrity, and Availability (CIA) of data and services. CIA is also known as CIA triad.

The future of stock market analysis

Stock sales and trading play a huge role in the U.S. and global economy. Stock exchanges provide the backbone to the economic infrastructure of our nation, as they help companies to expand when they’re ready by offering the general public a chance to invest in company stock. However, investing in the stock market can be a gamble.

One Year Later: First GDPR Execution Overview Reveals There's Still Work to Do

It’s been nearly a year since the European Union’s General Data Protection Regulation (GDPR) became enforceable. In that span of time, news outlets have reported various stories largely concerning the regulation and its penalties scheme.

Employee Investigations 101

Every visionary business wants to onboard the best of the best when it comes to talent. When hiring, companies look for hardworking, trustworthy individuals that they can rely on to propel the business forward. Similarly, people don’t typically hire people thinking they might start stealing money or misusing information and resources. Unfortunately, this happens quite regularly.

Internal Audit Checklist for Your Manufacturing Company

The manufacturing industry faces increasing scrutiny from regulatory agencies. As cybercriminals increasing target SCADA system weaknesses, an organization’s cybersecurity posture becomes more important to its ability to protect data and obtain important contracts. Starting with a security-first approach to cybersecurity often protects data, but to meet compliance requirements, the organization need to document the effectiveness of its internal controls.

Adversary simulation with USM Anywhere

In our previous blog, we analyzed how it is possible to map malware threats using the MITRE ATT&CK™ framework. In this blog, we will test the USM Anywhere platform against red team techniques and adversary simulations. We performed this analysis as part of our continuous efforts to improve the platform’s detection effectiveness.

Enhancing Kubernetes Security by Shifting Security Left

In the rapidly evolving world of Kubernetes security & compliance, DevOps and DevSecOps teams are detecting security challenges and compliance issues later in the development & deployment cycles. We are excited to share new features and updates that help DevOps and DevSecOps teams detect issues and ensure compliance throughout the development cycle.