Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Is Airport WiFi Safe?

No, using public WiFi in airports is not safe because you could unknowingly be sharing your private data with a cybercriminal. Because public networks are unsecured and airports are filled with people on the go, cybercriminals frequently target them to steal sensitive information and gain access to victims’ online accounts. Continue reading to learn what is so dangerous about using airport WiFi and how to stay safe if you do need to use it while traveling.

Global SOC Survey Reveals Hope for SecOps Teams As Post-SOAR Hyperautomation Boosts Analyst Retention and Tenure

The SANS 2024 SOC Survey, a comprehensive new Torq-sponsored study, reveals that for the first time in decades, the tenure of SOC and Security Analysts is increasing. They’re choosing to remain at their posts for three-to-five years, up from an average of one-to-three years. Modern post-SOAR hyperautomation solutions are playing a significant role in alleviating the burdens these cybersecurity pros face.

RansomHub Ransomware - What You Need To Know

Despite first appearing earlier this year, RansomHub is already considered one of the most prolific ransomware groups in existence. It operates a ransomware-as-a-service (RaaS) operation, meaning that a central core of the group creates and maintains the ransomware code and infrastructure, and rents it out to other cybercriminals who act as affiliates.

PCI DSS compliance with SIEM, CSPM and MxDR

In a world where increasing numbers of transactions are done online, compliance with PCI DSS (Payment Card Industry Data Security Standard) is crucial. However, with more organizations turning to cloud-based service providers such as AWS, Azure or GCP, ensuring that payment data is kept completely secure is becoming more challenging.

What are Risk Engines, and How to Make Sure They Work Well

Risk management has always been a central part of business, especially for financial institutions. From bank loan underwriting to insurance premium calculations and payment risk assessment, comprehensive risk management methodologies are vital to any business that deals with high-trust user actions. In particular, risk management is crucial to combating fraud – a huge global problem, the broad economic impact of which is clear.

How to scale your GRC program with automation

According to Vanta’s 2023 State of Trust Report, respondents spend an average of nine working weeks per year on security compliance. ‍ Some security teams have accepted that governance, risk, and compliance (GRC) will inevitably take tons of time and effort. And many continue to work towards small-scale efficiencies because they don’t believe anything better is possible. ‍ But there’s a better option for today’s businesses: GRC automation.

From simulation to success: the impact of fuzzing in software-in-the-loop testing

Software-in-the-loop (SiL) testing is a pivotal method in the software development lifecycle, especially for embedded systems and critical applications. By simulating real-world conditions and integrating software components within a controlled virtual environment, SiL allows for the early detection of bugs, ensuring higher code quality and reliability. Read on to learn how to introduce SiL testing in your project.

FDA's cybersecurity requirements for medical devices and when to comply with them

The United States Food and Drug Administration (FDA) is a federal agency within the Department of Health and Human Services. The FDA is responsible for protecting and promoting public health through the control and supervision of medications, vaccines, biopharmaceuticals, medical devices, and other types of products. To ensure the safety and security of medical devices, the FDA supports a variety of standards and guidelines that medical device manufacturers are highly recommended to follow.

Unlocking the potential of machine identities: A Glimpse into One Identity's Unified Identity Platform future

Machine identities are growing faster than human identities, with a growth rate of 10 to 45 times higher. This complexity is compounded as more organizations adopt multi-cloud and hybrid strategies, a trend forecasted to continue through 2024. There’s also the rise in endpoints, as more machines become IoT-connected, leading to widening attack surfaces.