Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Cloud Challenges by the Numbers: Adoption and Configuration

The year 2020 has shown us that cloud computing is among the most powerful capabilities humanity has, enabling people around the globe continue their everyday business and education uninterrupted. We continue gathering the most interesting findings from industry research. If you’re interested in learning statistics on cloud usage, top cloud initiatives and cloud security concerns, read the 2020 State of the Cloud Security Statistics article.

How Does Ransomware Work? It Doesn't Have to If You're Prepared

Ransomware attacks have become the most common security threat faced by businesses today. A recent report from TrustWave indicates that the number of ransomware attacks quadrupled last year; this type of attack now accounts for more than 20% of all digital security incidents. It’s now more common than even credit card theft.

Nightfall helps modernize The Brain and Spine Clinic with DLP for Slack

Dr. Jacob Januszewski opened The Brain and Spine Clinic in January 2020 to serve his community in eastern Florida. Jacob combines his expertise in Minimally Invasive (MIS) Complex Spine Deformity surgery with patient care and compassion to help anyone who visits his clinic get the treatment they need and ensure a smooth recovery.

How Cyber Kill Chain Can Be Useful for a SOC Team? (Part 2)

Installation: At this stage, SOC analysts are advised to deploy a Security Information and Event Management (SIEM) and Host-Based Intrusion Detection System (HIDS) to detect attacks. To deny an attack, Cyber Kill Chain recommends using Two-Factor authentication, strong password, and privilege separation as well as disrupting attack using data execution prevention.

The Business of Cybersecurity: How Security Programs Drive Business Results

Surprisingly, many organizations have yet to move beyond the traditional compliance-driven approach to cybersecurity. However, to address today’s risk of a cyber breach — which can lead to an organization’s data being compromised or a disruption to business operations — cybersecurity organizations need to focus on delivering the level of security required to protect corporate assets and align with the strategic goals and objectives of the business.

Alternate credit scoring: A boon for the banking sector

Financial institutions are responsible to provide liquidity to the economy and permit a greater magnitude of economic activity. Without financial institutions all the stacks of dough will be stuffed under your mattress, no benefits from fluctuating interest rates could be reaped. These establishments basically conduct financial transactions such as deposits, investments and loans.

Self-Service Network Security for Kubernetes

Learn how to empower your team with safe self-service network security for Kubernetes with Calico Enterprise. What are Calico Enterprise Network Policy Tiers How to use tiers to enable safe self service policy management What are Calico Enterprise Policy impact preview and staged network policies How to enable operations and developers to safely manage Kubernetes network policy How to build a workflow using these tools to safely deliver approved changes to your clusters