Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

The Power of Red and Purple Team Drills in Enhancing Offensive Security Programs

Despite investing in costly security solutions, keeping up with patches, and educating employees about suspicious emails, breaches still occur, leaving many organizations to wonder why they are vulnerable and which security areas need improvement.

Splunk SOAR Playbook of the Month: Cisco Umbrella DNS Denylisting

Given the recent exciting news of Splunk becoming part of Cisco, for this edition of Splunk SOAR Playbook of the Month, we thought what better way to showcase how the combination of Cisco and Splunk can help users achieve more comprehensive security than through a playbook that combines the power of Cisco Umbrella and Splunk SOAR.

Understanding Allow anonymous SID/Name translation in Windows

In a network each user, whether verified or not, is given a security identifier (SID), a virtual name tag. This unique identifier helps with managing users, giving administrators the ability to control on an individual level the rights and permissions of users, authentication and providing an overall level of security. A SID also hides private information of users such as the real names of the accounts, adding an additional layer of protection.

NVD's Backlog Triggers Public Response from Cybersec Leaders

Just a few weeks ago, we wrote about how the National Vulnerability Database (NVD) is seriously behind in enriching CVEs. On LinkedIn, Mastodon, and other social sites, the NVD’s mounting backlog and what should be done about it has become a hot topic of conversation within the cybersecurity community.

Building a decentralized travel ecosystem

Welcome to 'Personally,' Persona’s podcast, where we bring you closer to the personal stories behind some of the most innovative and inspiring entrepreneurs of our time. I'm your host, Ed Giansante, and in today's episode, we're venturing into the dynamic intersection of technology and travel. Our guest is Cynthia Huang, Co-founder and CEO of Dtravel. Dtravel is more than just a travel platform; it's a community-owned and operated travel ecosystem that's revolutionizing the way hosts and guests connect.

10 Information Security Policies Every Organization Should Implement

Creating and implementing information security policies (ISPs) may seem like a formality to some. However, ISPs can form the backbone of your organization’s data security posture. Information security policies and procedures may help you prevent breaches of sensitive data as well as safeguard your reputation and finances by defining what’s allowed within your organization and what’s not. Nonetheless, developing an efficient security policy may be a lengthy and daunting task.

Streamlining Merchant Settlement and Cross-border Payments with Stablecoins

The world of payments is having its “Henry Ford” moment. Traditional organizations in the industry, from payment service providers (PSPs) to banks, are still using the equivalent of horses for settlement and cross-border transactions. In contrast, innovative startups and certain forward-looking incumbents have embraced this industry’s Model T – blockchain technology. The results that payments providers exploring blockchain have reported thus far can’t be ignored.

New Feature: WebDAV Is Now Available Alongside Internxt's CLI Tool

Internxt is thrilled to announce we have released a new feature that our users have requested: WebDAV support! Now, with a WebDAV server, you can get even more out of your Internxt membership, such as file management, remote access, and the same emphasis on security implemented throughout the entire product suite. To learn more about downloading the Internxt CLI and using WebDAV, visit our help center article.

Nightfall named a "Data Security Solution of the Year"

We’re thrilled to announce that Nightfall was selected as the “Data Security Solution of the Year” in the 2024 Data Breakthrough Awards. With enterprises scrambling to stay on the cutting edge of innovation, it’s all too easy to lose sight of data stewardship. In addition to SaaS apps, email, and endpoints, now enterprises must also safeguard their generative AI (GenAI) applications, including both custom and third-party GenAI tools.