Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Is Cybersecurity Smart Enough to Protect Automated Buildings?

Imagine that you are in an elevator in a high rise building when suddenly the elevator starts to plummet with no apparent stopping mechanism other than the concrete foundation below. While this may sound like something from a Hollywood movie, consider the idea that a securely tethered, fully functional elevator is as vulnerable as it is smart.

Accelerate Incident Response and Incident Management with AIOps. 5 Key Benefits in Cisco Environments

Artificial Intelligence for ITOps (AIOps) can help accelerate incident response with all the incident context, impact assessment, triage data and collaboration & automation tools at one place.

Remote Work and Data Security: The Human Factor

If you read our earlier blog, you know Egnyte commissioned a study to better understand how COVID-19 has impacted businesses’ ability to maintain data security and governance with a distributed workforce. The results can be found in our inaugural Data Governance Trends Report. The report offers insights into tools that the 400 IT leaders implemented to help weather the abrupt change, but it also explains the human side of data protection and governance in the age of COVID.

Foresight Mental Health is changing mental health care for the better with DLP in mind

Industry: Healthcare Employees: 244 HQ Location: San Diego, CA Keely Strong, Director of Operations Complex problems, like delivering high quality mental health services during a pandemic, require creative thinking. Foresight Mental Health began at the intersection of ingenuity and necessity: changing the way people interact with and think about mental health care by creating accessibility through the use of insurance plans and increasing provider availability.

Peace out this holiday season by securing every transaction against card-not-present fraud

We are about to enter the most wonderful time of the year. As consumers increasingly turn towards online and mobile commerce, are you confident in your card-not-present fraud detection capabilities? 2020 has been a year of great surprise and change. While the global health pandemic has changed how we physically interact with each other, it has also revolutionized how we shop.

Understanding an API Provider's Privacy Policy

Regardless of what industry your company belongs to, you are obligated to think about the privacy of your customers. Not only is it good business, but privacy expectations have been set through regulations like the EU’s General Data Protection Regulation (GDPR), California’s Consumer Privacy Act (CCPA), and many others across the world.

20/20 hindsight shows that foresight wasn't 20/20

In a year marked by unprecedented challenges, we revisit the 2020 cyber security predictions to see which projections held up and which ones didn’t. ’Tis the season. No, we’re not talking about the holidays—Thanksgiving, Hanukkah, Kwanzaa, Christmas, and others. In the world of cyber, ’tis the season for speculation. Every year around this time, experts dust off their crystal balls and tell us what to expect in the coming year.

The Future of Ransomware: Preparing for the Next Generation of Ransomware Attacks

Ransomware has been the scourge of cybersecurity and may have led to a recent death. Now it soon may get way more dangerous The threats to cybersecurity are constantly evolving. As security teams develop solutions to the threats, malicious actors change their tactics to keep chasing their ill gotten gains. After all, the Game is the Game. And the game keeps changing. In recent years, ransomware has been the weapon of choice for hackers looking for a payday.

Secure your infrastructure in real time with Datadog Runtime Security

From containerized workloads to microservice architectures, developers are rapidly adopting new technology that allows organizations to scale their products at unprecedented rates. In order to make sense of these complex deployments, many teams are abstracting applications away from the environments in which they run. Because of this trade-off, developers and security teams lose the access to the unified context from infrastructure to application needed to fully secure their services.