Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

CMMC Compliance: Customer and Shared Responsibility Matrix

CMMC is a familiar framework to any contractor working as part of the defense industrial base and handling any form of controlled unclassified information. Whether it’s compliance in general, a specific clause relating to DFARS 252.204-7012 in your contract, or impetus from another source, you’re going to need to implement security standards from NIST SP 800-171 and adhere to the rules laid out in the Cybersecurity Maturity Model Certification framework.

Phishing Attacks Continue to Leverage URL Shorteners to Obfuscate Malicious Links

Analysis of current phishing attacks by security researchers have uncovered an increase in the use of trusted shortlink services. To be successful, phishing scammers need to establish legitimacy as much and as early as possible. Brand impersonation within an email has long been one method, but to establish legitimacy to security solutions, scammers have had to do more than just have a look-alike domain.

Best Practices for Implementing Cloud Migration Security

As modern businesses increasingly rely on cloud services, securely migrating data to the cloud has become crucial. Effective cloud migration allows organizations to leverage external expertise and resources while maintaining data integrity and compliance. This guide provides a comprehensive understanding of secure cloud migration, best practices, essential security measures, and successful real-world examples to help businesses benefit from these practices without compromising data security.

Securing Your Sensitive Data: Top 7 Cloud Migration Strategies and Best Practices

Cloud migration refers to the process of moving data, applications, and other business elements from on-premise data centers to a cloud computing environment. This transition is crucial for modern businesses aiming to enhance their operational efficiency, scalability, and flexibility. Cloud migration offers numerous benefits, including cost savings, improved performance, and the ability to leverage advanced technologies like AI and big data analytics.

Friday Flows Episode 30: Normalize Alerts with Tines AI and create Cases AI

FRIDAY FLOWS Episode #30 - Normalizing Alerts using Tines AI & Creating Cases In today's episode, Michael Tolan takes us through a workflows where we're leveraging the new Tines AI Action to normalize multiple alerts and create cases in our native Case management. As always, our free Community edition is in the comments and we'd love to hear what you thought of today's episode in the comments.

MLOps & the Role of GenAI in Securing the Software Supply Chain

Artificial Intelligence and Machine Learning have hit the mainstream – particularly the use of Gen AI and LLMs to help organizations automate manual processes and analyze data at machine speed with dramatic results. How can ML and Gen AI help DevOps teams better secure the software supply chain? As the volume of code grows exponentially, these evolving technologies offer new, more efficient means to secure, deliver and scale software – but with accompanying risks that must be mitigated.

8 Stages of the AI "Emotional Rollercoaster"

Feelings are running hot right now when it comes to generative AI (GenAI). Within the business community, many employees (and execs) are nervous with excitement and anticipation. Others are more fearful and skeptical of how this “thing” will play out, which leads us to an important question: Are enterprises too emotional when it comes to adopting nascent technologies?

Global Cyber Attacks See Highest Increases in the Last Two Years

New analysis of Q2 2024 cyber attacks shows the number of attacks experienced weekly by organizations globally is on the rise. Each quarter, Check Point Research puts out a quarterly report covering what cyber attack activity they’re seeing globally. Their latest report covering Q2 of 2024 highlights an unexpected rise in overall attack numbers.