Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Best Practices for Implementing Cloud Migration Security

As modern businesses increasingly rely on cloud services, securely migrating data to the cloud has become crucial. Effective cloud migration allows organizations to leverage external expertise and resources while maintaining data integrity and compliance. This guide provides a comprehensive understanding of secure cloud migration, best practices, essential security measures, and successful real-world examples to help businesses benefit from these practices without compromising data security.

NCIIPC Explained: Safeguarding India's Critical Infrastructure

Safeguarding critical infrastructure is crucial for national security and economic stability in the digital age. The National Critical Information Infrastructure Protection Centre (NCIIPC) plays a key role in protecting India's vital assets and critical infrastructure. Tasked with the monumental duty of protecting the nation's most vital assets—such as power grids and financial systems—the NCIIPC stands as a stronghold against the constantly evolving landscape of cyber threats.

MLOps & the Role of GenAI in Securing the Software Supply Chain

Artificial Intelligence and Machine Learning have hit the mainstream – particularly the use of Gen AI and LLMs to help organizations automate manual processes and analyze data at machine speed with dramatic results. How can ML and Gen AI help DevOps teams better secure the software supply chain? As the volume of code grows exponentially, these evolving technologies offer new, more efficient means to secure, deliver and scale software – but with accompanying risks that must be mitigated.

Turning Novel Threats into Detections Easily with SnapAttack

Our CTO, Fred Frey, met with Teddy Powers from Google Cloud Security at the Google Massachusetts Ave Office to discuss the topic: "Turning Novel Threats into Detections Easily with SnapAttack." Discover how SnapAttack can integrate with Mandiant's threat intelligence, security validation, and Google Chronicle to enhance detection and create actionable workflows for your organization.

Friday Flows Episode 30: Normalize Alerts with Tines AI and create Cases AI

FRIDAY FLOWS Episode #30 - Normalizing Alerts using Tines AI & Creating Cases In today's episode, Michael Tolan takes us through a workflows where we're leveraging the new Tines AI Action to normalize multiple alerts and create cases in our native Case management. As always, our free Community edition is in the comments and we'd love to hear what you thought of today's episode in the comments.

CMMC Compliance: Customer and Shared Responsibility Matrix

CMMC is a familiar framework to any contractor working as part of the defense industrial base and handling any form of controlled unclassified information. Whether it’s compliance in general, a specific clause relating to DFARS 252.204-7012 in your contract, or impetus from another source, you’re going to need to implement security standards from NIST SP 800-171 and adhere to the rules laid out in the Cybersecurity Maturity Model Certification framework.

Understanding Process Level Token

Every program running on a system needs specific permissions to access files, networks and other resources. A process level token acts as an ID for each program determining what it is allowed to do and access on the system. Tokens are critical for certain Windows functionalities, such as Task Scheduler, which uses this privilege to manage processes on behalf of different users.

Governing access to the Microsoft Dynamics estate

ERP and CRM systems are key parts of an organization’s business infrastructure and digital transformation initiatives. One Identity frequently works with customers who use systems from vendors such as SAP, Salesforce and Oracle, and we are seeing more organizations using Microsoft Dynamics products. This is probably due to two factors: a heightened awareness of the importance of Identity Governance to the Dynamics community, and the growth in the adoption of Dynamics products.

DLP 101: 12 Best Data Loss Prevention Tools of 2024

Data loss prevention (DLP) is critical for enterprises to secure sensitive information and maintain compliance with leading standards like HIPAA, PCI-DSS, SOC 2, GDPR, and more. Here are just a few use cases for how DLP solutions are used: In short? Adopting an effective DLP strategy is vital for maintaining data integrity, compliance, and protection against evolving security threats.