Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

LimaCharlie Slashes Incident Response Times With New Bi-directional Capabilities

LimaCharlie introduces a new bi-directional integration platform enhancement, which allows for two-way data flows that streamline detection and response processes while eliminating reliance on third-party automation applications.

What To Know About Endpoint Monitoring in 2024

Today’s workforce is more distributed than ever. Globally, 16% of companies are fully remote, while 40% have a hybrid arrangement. As workforces become increasingly distributed, security leaders face many challenges. They must monitor potential malicious activity across a wide array of devices scattered throughout the entire network. With the rise of endpoint monitoring tools, it has become easier to monitor devices. But challenges remain.

Trustwave Government Solutions (TGS) Salutes New Mexico's New Cybersecurity Executive Order

New Mexico Governor Michelle Lujan Grisham issued an Executive Order to shore up the state’s cybersecurity readiness and better safeguard sensitive data by conducting a state-wide security assessment and adopting National Institute of Standards and Technology (NIST) standards by Nov. 1, 2024.

How a Network Digital Twin Helps Overcome One of the Most Significant IT Challenges: Technical Debt

Rodney Alto served 35 years as a senior executive in technology at the Central Intelligence Agency. He’s now a senior advisor for federal strategy and security at Forward Networks. What is one of largest challenges today in IT? It’s not AI, quantum computing, or even cyber—it’s technical debt.

What Are the Five Pillars of Zero-Trust Security?

The zero trust maturity model is a Cybersecurity and Infrastructure Security Agency (CISA) initiative to help achieve a modern approach of zero trust through the implementation of five pillars with cross-cutting capabilities. The five pillars of zero-trust security are identity, device, network, application and workload and data.

Navigating Cybersecurity Risk Management: Aligning Stakeholder Expectations in Response to Regulations

In light of the SEC's cybersecurity disclosure regulations in the US and NIS2 in Europe, corporate executives and institutional investors are facing a pressing need to align their expectations and improve understanding around cybersecurity risk management. The evolving threat landscape and regulatory environment highlight the importance of cohesive strategies to measure, prioritize, mitigate, and communicate cyber risks effectively.