Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Simplifying FedRAMP Compliance with Teleport

FedRAMP compliance is notoriously challenging, but it doesn't have to derail your DevOps flow or tech stack. Discover how Teleport’s robust infrastructure access and security platform addresses some of the toughest questions and hurdles in the FedRAMP process, empowering engineering, compliance, and security leaders to implement and enforce security controls seamlessly.

How to Set Up Real-Time Data Replication for VMware VMs with NAKIVO Backup & Replication

The Real-Time Data Replication for VMware functionality in NAKIVO Backup & Replication allows you to create real-time replicas of VMware VMs, continuously updated with source VM changes. Follow the steps in this video to learn how to deploy a target Transporter, install the I/O Filter and Journal Service, and create your first real-time replication for VMware vSphere with NAKIVO Backup & Replication.

MSASE Dashboard Overview

Managing multiple customers from a single console is good, but being able to get all of the analytics and usage data all in a single dashboard is amazing. Cato’s MSASE Partner Platform Dashboard provides just that...a single pane of glass to see all of your customer account analytics, with actionable data and deep-linking to the customer tenants.

How to Use Improved Retention | Backup Retention Policy

NAKIVO Backup & Replication offers two approaches to creating a backup retention policy and scheduling: legacy and improved retention. Follow the steps in this video to learn how to create multiple schedules with unique retention and immutability periods within a single backup job using the improved retention approach.

Navigating the FTC's Non-Compete Ban: A Guide for Information Security Teams

On April 23, 2024, the Federal Trade Commission (FTC) issued a ruling that banned the use and enforcement of non-compete agreements across the United States. With this ruling, enterprises that relied on these agreements to help preserve their competitive advantage must adapt their strategy for protecting proprietary information when an employee departs. Read on for a breakdown of the ruling, what strategies remain open for dealing with this risk, and how security teams can help their organization adapt.

2024 Bitsight Ratings Algorithm Update: Purpose, Observations, and Impact

As our 2024 Rating Algorithm Update (RAU) goes live on July 10, 2024, we wanted to share some research that validates this update and reinforces the importance of the RAU process. As we noted in our announcement blog, after RAU 2024, remediated Patching Cadence findings will impact the Bitsight Rating for 90 days after the last vulnerable observation instead of 300 days.

Memory Dump Analysis: Using LiME for Acquisition and Volatility for Initial Setup

Memory dump analysis is a crucial aspect of digital forensics, offering a snapshot of a system's volatile memory at a specific point in time. This can uncover critical evidence such as running processes, open network connections, and in-memory malware execution that disk analysis might miss. In a previous blog, we learnt how to use fmem for volatile memory acquisition.

The Real-World Threat of Cyberattacks on Water infrastructure

Do you remember the last time you didn’t have water? Reliable water delivery is something many of us take for granted. Our local water treatment plant sits at the edge of our neighborhood, and I pass it every day on my way to take the kids to school. Not a lot seems to go on there, so it never occurred to me that I should be concerned about an attack on this critical infrastructure. What does occur to me is the possibility of a cyberattack on our water system.

Are Businesses Taking Ransomware Seriously Essential Protection Tips for SMBs

Join Anand Prahlad, CEO & President of Parablu, and Venkatesh Sagare, Co-founder and CTO of Giniminds and Cloudigy, as they discuss the critical issue of ransomware attacks. They explore whether businesses, especially small and medium-sized ones, understand the real threat of ransomware. Venkatesh shares some compelling stats.