Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Optimizing Asset Management and Incident Response: CyCognito's New Integration with ServiceNow CMDB

Effective asset management and rapid incident response are crucial for maintaining cybersecurity defenses. To address these needs, and building on its previous Vulnerability Response module integration, CyCognito has announced a new certified integration with ServiceNow’s Configuration Management Database (CMDB).

Navigating Quebec's Law 25: Essential Compliance Tips and FAQs

Quebec’s Law 25, also known as Bill 64, imposes strict rules on how organizations handle personal information. With the final phase of implementation now in effect (September 2023), businesses need to ensure Law 25 compliance to avoid hefty fines and maintain customer trust. Here’s what you need to know, along with answers to frequently asked questions.

Operationalizing Data Security Posture Management

Operationalizing any new security platform begins with the process of integrating the platform with an organization’s existing infrastructure and workflows. To get the most value out of the system we need to offer an easy path to adoption if we want to crossover from theoretical security concepts into practical, day-to-day operations that protect against cyber threats. Technology change is hard, but changing the way people work is even harder.

PCI 4.0.1. has arrived. Here's what you need to know about Requirement 6.4.3

As the Payment Card Industry Data Security Standard (PCI DSS) compliance standards continue to evolve, our team has been fielding a number of questions about the changes to 4.0, how to interpret them and ultimately how to get or remain compliant. We decided to create a blog series covering some of these recent changes with practical, actionable tips for getting started. Many organizations subject to PCI-DSS may not be aware that the latest version, PCI 4.0.1 has been released.

Vendor Scanning Process Flow & How to Automate (The 2024 Guide)

As organizations increasingly rely on cloud-based infrastructure and face growing cyber threats, traditional vulnerability scanners are no longer sufficient. Modern vulnerability management platforms must identify vulnerabilities and proactively assess their risks, prioritize remediation efforts, and provide comprehensive reporting.

TCA Tanium Certified Administrator - Certification Series - Tanium Tech Talks #100

Welcome to this installment of the Tanium certification series. Today we're looking at the entry level Tanium Certified Administrator exam, the TCA. As with other exams in this series, I've invited one of the experts who helped write the exam questions to give us an insider's look at what is covered and to help you prepare.

Cybersecurity Compliance as a Service: Your Ticket to Saving Money, Time, and Sanity with Cybersecurity Compliance

Maintaining Cybersecurity compliance is an arduous task, fraught with challenges. It's costly and time-consuming, and often, the complexity of regulations outpaces an organization's ability to manage them effectively.

Top cyber security threats to look out for

Increasingly sophisticated cyber security threats present significant challenges for businesses and individuals alike. And with increasing dependency on technology and digital platforms, understanding the various types of cyber security attacks and how they can impact an organization is crucial to maintain a secure business environment. From phishing scams to ransomware attacks, cyber security attacks are constantly evolving, becoming more targeted and difficult to detect.