Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

From Office to Remote: Adapting Endpoint Security Strategies

As remote work becomes the norm, organisations face new challenges in securing devices outside the office. This clip discusses the return to host-based security and the importance of robust endpoint security measures backed by logs and alerts. Learn how to adapt your security strategies for remote environments where device locations are unknown.

Banking Fraud 2024: Key Risks and Strategies for Prevention

As we navigate through 2024, banking fraud continues to evolve, presenting new challenges for financial institutions. Driven by advancements in technology and changing economic conditions, these threats require banks to stay vigilant and adopt robust strategies to protect themselves and their customers.

Q1 2024 Cyber Threat Landscape Report: Insider Threat & Phishing Evolve Under AI Auspices

In Q1 2024, we saw an evolution in techniques used by attackers, some of which may point to longer term trends in the variation and sophistication of attacks faced by organizations. In particular, with regards to phishing, we saw SMS and voice-based tactics being used, which raises concern around the potential for deep fakes and AI-type technologies to further enhance the effectiveness of phishing attacks.

Announcing Vanta's industry-first partnership to automate HITRUST e1

Today we’re excited to announce that Vanta has partnered with HITRUST Services Corp., the leader in cybersecurity assurances, to be the first automated compliance solution for the HITRUST e1 Assessment and reseller of the HITRUST MyCSF platform. Vanta is the first pre-built solution that includes the controls, documents, and policies necessary to demonstrate your commitment to safeguarding data and protected health information (PHI) — all in a way that can be validated by HITRUST. ‍

OSV Scanner vs npm-audit: A detailed comparison of SCA tools

The widespread adoption of external libraries and packages in the modern application development process introduces potential security risks that could impact the entire application. To address this, Software Composition Analysis (SCA) tools like npm-audit and OSV Scanner play an important role.

Leadership Strategies for Risk Reduction, Transparency, and Speed

To respond to the increasing number of federal cybersecurity recommendations and regulations, cybersecurity leaders and their teams need to be confident in the transparency and resiliency of their security processes. The key is a strong and well documented risk management program. This is imperative for the compliance or incident audits that come with regulations.

Unlock Convenience with Brivo: Remote Lock Control

Discover the future of access control with Brivo! In this video, we dive into the seamless integration of Brivo's technology that allows for remote unlocking of doors, eliminating the need for on-site personnel. This not only enhances convenience but also significantly boosts efficiency in managing access to your spaces.

Unlocking SOC Superpowers: How Next-Gen SIEM Transforms Your Team

CrowdStrike Falcon Next-Gen SIEM transcends the limitations of legacy SIEMs so you can detect and stop breaches faster than ever. It accomplishes this feat in part by upleveling every member of your SOC. Falcon Next-Gen SIEM helps security engineers streamline deployment by providing a growing set of data connectors and the key data they need already in the CrowdStrike Falcon platform. Security analysts, empowered with generative AI and automation, can navigate complex investigations.