Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Updated SafeBreach Coverage for US CERT Alert AA23-061A - BlackSuit (Royal) Ransomware

On August 7th, the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) issued an update to an existing advisory (AA23-061A) highlighting new TTPs being leveraged by the recently rebranded “Royal” ransomware gang – now known as BlackSuit. Detailed information about this threat and the associated IOCs and TTPs can be seen on #StopRansomware: Blacksuit (Royal) Ransomware.

Creating a Secure Community of Interest (COI) for Defence & Industry Information Exchange

The secure exchange of information between the Government, Defence and the supply chain is critical to operational outcomes. A Community of Interest (COI) is often used to facilitate multi-party coordination and collaboration between these parties but is often difficult to implement. Let’s explore the use cases, challenges and tools for creating COIs for secure information exchange.

Data Governance & Compliance: Navigating the Digital Maze

Is your company grappling with an increasing volume and complexity of information? A strong data governance framework is essential to harness the power of data while lessening risks. This strategic framework ensures data is managed effectively, meets quality standards, and supports informed decision-making, quality standards, and supporting informed decisions. As regulatory compliance burdens intensify, data governance has become critical to organizational success.

REPLAY: Revisiting Play Ransomware Anti-Analysis Techniques

The Play ransomware, also known as PlayCrypt, is a ransomware that first emerged in June 2022. The ransomware has been targeting industries such as healthcare and telecommunication as well as a wide range of regions such as Latin America, Europe, and North America. The Play ransomware is known for gaining access to networks through compromised valid accounts or by exploiting specific vulnerabilities. Once inside the network, it uses a big pool of known post-exploitation tools to continue its attack.

Mastering the Art of Cloud Governance: A Comprehensive Guide

In today’s fast-paced digital landscape, cloud computing has become an indispensable asset for organizations seeking agility, scalability, and cost-efficiency. However, as businesses embrace the cloud, they must also navigate the intricate challenges of managing and securing their cloud environments. This is where the concept of cloud governance comes into play, serving as a crucial framework for establishing control, ensuring compliance, and optimizing resource utilization.

A security expert's view on Gartner's generative AI insights - Part 2

Welcome to the second part of our two-part special on Gartner’s “4 Ways Generative AI Will Impact CISOs and Their Teams” report! If you’ve missed the first part on model composition, you can read it here. Today, we will explore why security specialism matters in an AI security tool, particularly where AI quality is concerned.

SecurityScorecard and ServiceNow Expand Partnership with New Capabilities for TPRM and Security Incident Response (SIR)

ServiceNow and SecurityScorecard have been longtime strategic partners, helping mutual customers measure and manage cyber risk. Today we’re highlighting the next phase of our partnership and innovation to help customers tackle the complex challenges associated with managing cyber risk in the third party ecosystem. Organizations struggle with prioritization, resource constraints, and the need to act quickly when responding to threats.