Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Why Companies Don't Archive (Common Challenges and Pitfalls in TMF Archival)

Failure to archive a completed Trial Master File (TMF) is, to put it simply, non-compliant. Despite this fact, pharmaceutical and biotech companies are often known to drag their feet on this process. Why would such organizations expose themselves to that risk? Unfortunately, there are several common hurdles that teams face when it comes to TMF archival. In this post, we’ll walk through what those hurdles are and how to overcome them.

Network Security Configure Encryption Types Allowed for Kerberos

The ability to authenticate securely over an unsecure network is paramount in safeguarding sensitive information and maintaining trust in digital interactions. In an era where communication often occurs over public networks like the internet, ensuring the authenticity of users and data is critical to prevent unauthorized access and data breaches. Kerberos is a Windows security network authentication protocol that allows users and services to securely authenticate over a non-secure network.

Chat With a CISO (CWAC): Chat 1 - Lianne Potter: Breaking Down The World of SecOps

Join us as we chat with Lianne Potter about the world of SecOps, cover a unique perspective on cyber security and look at how to break into the industry. In our latest episode, we chat with Lianne Potter, Head of Security Operations at Asda. Join us as we explore Leanne's cybersecurity journey and her insights on industry changes. Discover a fresh perspective from Lianne on breaking into this challenging field. Tune in for expert advice and innovative perspectives in the dynamic world of cyber security.

Holistic Visibility: The Importance of Log Sources and Ingestion

You can’t secure what you can’t see goes the saying in cybersecurity. That’s why holistic visibility is so crucial for organizations tasked with staying safe in the evolving threat landscape, as it gives you full visibility into your environment. But there’s another adage that matters even more, because without access to log sources and the proper ingestion of their data, you can’t see the forest for the trees. But what are log sources? What does proper ingestion look like?

Compliance Risk Assessment for Banks

Banks are one of the most heavily regulated business sectors, with stiff regulatory compliance obligations and close scrutiny from regulators. As such, managing regulatory compliance has become challenging for banks in recent years. Compliance failures can result in significant fines, reputational damage, bad publicity, and even lawsuits. It’s vital for banks to conduct regular compliance risk assessments to identify, evaluate and mitigate emerging risks.

Revolutionizing Security: BoxyHQ's Vision for the AI Era

In today's fast-paced world dominated by AI, BoxyHQ stands at the forefront of innovation. Originally focused on developing security building blocks for developers, our journey has led us to confront the challenges of responsible AI interaction and data protection in the face of AI proliferation. Imagine a world where AI isn't just a tool but an integral part of daily life. Every decision and every interaction is shaped by algorithms and machine learning models.

Network Hardening Guide for IT Professionals

Network hardening involves implementing measures such as configuring firewalls, securing remote access points, blocking unused network ports, removing unnecessary protocols, implementing access lists, and encrypting network traffic to mitigate unauthorized access and bolster the security of a network’s infrastructure. This process involves identifying and addressing vulnerabilities in device management and configurations to prevent exploitation by malicious actors aiming to infiltrate the network.

ESXi Ransomware: Trends, Logging, and Detection | Threat SnapShot

Since 2021, ransomware groups have set their sights on VMware ESXi hypervisors, with the SEXi variant, emerging in 2024, being the most recent threat. The Babuk Locker was one of the first to target ESXi, and its leaked source code enabled other strains like ESXiArgs, BlackBasta, and Clop to develop customized variants terminating VMs and encrypting data on ESXi servers. While employing similar tactics like exploiting vulnerabilities and encrypting VM files, these ESXi-focused ransomware exhibit patterns that provide detection opportunities across the board. By analyzing past attacks, we can better prepare for future threats targeting our virtualization environments. Join the SnapAttack community to access in-depth detection content covered in this video and stay ahead of evolving ransomware targeting ESXi.