Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Overcoming The Challenges Of Selecting An Insider Threat Detection Tool

In a crowded market with so many new products being released, it can often be hard to make sure you're getting the right tool for your organization's security needs. Purchasing an Insider Threat Detection tool for your organization requires extensive research, which can be very time-consuming.

Tripwire Tips and Tricks: Five Things to Do With MITRE ATT&CK

In this session of the Tripwire Tips and Tricks series, you'll learn how to use the MITRE ATT&CK framework to protect your organization from cyberattacks. Tripwire Security Researcher David Lu will walk you through five key use cases for the framework, helping you deepen your understanding of mapping defensive controls to the framework, threat hunting, incident response, and more.

Code Blue: Healthcare Security in the Age of 5G and Remote Work

Last year was an especially stressful time for healthcare systems. Not only were emergency rooms overwhelmed by patients, a number of them were also hit by system-crippling cyberattacks. According to Comparitech, in 2020 alone, 92 ransomware attacks affected over 600 healthcare organizations, exposing more than 18 million patient records. These attacks brought operations to a standstill for days or weeks at a time, costing the healthcare industry an estimated $20.8 billion.

Cryptocurrency scam attack on Twitter reminds users to check their app connections

Are you doing enough to prevent scammers from hijacking your social media accounts? Even if you have chosen a strong, unique password for your online presence and enabled two-factor authentication it’s possible that you’ve overlooked another way in which online criminals could commandeer your social media accounts and spam out a message to your followers.

Egnyte and Microsoft Now Empower Co-Editing for Desktop and Mobile

With today’s distributed workforce, it’s essential to have the right tools to collaborate with co-workers. Now with the Egnyte Microsoft Office integration, users can co-edit on Microsoft documents in real-time from the Office Desktop apps. Users now have a choice to use their preferred device.

Protecting data when migrating Confluence and Jira from on-prem to cloud

Atlassian made a big splash in cloud SaaS news when they announced that the company would stop selling new on-prem server licenses as of February 1, 2021. Upgrades of existing server licenses will continue to be available through the third quarter of 2022. Impacted services include Jira Software Server, Jira Core Server, Jira Service Desk Service, Confluence Server, Bitbucket Server, Crowd Server, Bamboo Server, Atlassian-built apps, and Atlassian Marketplace server apps.

Rubrik's Customer Trust Portal Puts Transparency First

At Rubrik, we’re committed to delivering the best data management capabilities seamlessly to our customers and partners. Customer Trust was one of the first functions we focused on building, because Rubrik’s customer-first philosophy is founded on the core pillars of transparency and security. Our goal is to deliver the same, seamless service Rubrik expects from its own suppliers and vendors in every customer and partner interaction.

The New Threat Landscape for Australian Healthcare

The COVID-19 pandemic has fundamentally shifted the cyber threat landscape for Australia’s health sector, with the Australian Cyber Security Centre (ACSC) reporting a 84% increase in the number of cyber security incident reports relating to the health sector between 2019 and 2020.1 As custodians of vast volumes of highly sensitive information, the industry continues to find itself at the mercy of cyberattacks that paralyze systems until a ransom is paid—threatening the security of patient d

What Are the HIPAA Standard Transactions?

The Department of Health and Human Services (HHS) defines a transaction as an electronic exchange of information between two parties, to carry out financial or administrative activities related to healthcare. For example, a health care provider will send a claim to a health plan to request payment for medical services.