Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why Removing Phishing Emails from Inboxes is Crucial for Healthcare Security

The adage "data is the new oil" doesn't resonate with everyone. Personally, having grown up around cars thanks to my dad, a master mechanic, I see oil as messy and cumbersome. Data, in my view, is more akin to bacon—universally enjoyed and valuable in various forms; everyone wants it and will go to great lengths to have an extra helping, maybe even pushing a sibling's arm out of the way to get the last piece.

Endpoint malware detection rises by 75%

Cybersecurity continues to be unfinished business for many companies. In a context where digitalization reigns in almost all areas, cybercriminals have more and more resources to draw on and continue to threaten the cybersecurity of millions of organizations. To guide companies and industry professionals through the ever-changing habits of malware, WatchGuard has released a new edition of our Internet Security Report (ISR).

Extend Attack Surface Visibility to AWS, GCP, and Azure with Bitsight

Bitsight excels at using externally available data to paint a detailed picture of organizations’ digital footprint, including assets, organizational hierarchy, third-party relationships, and risk posture. But as more IT resources shift to cloud service providers, gaining complete and precise visibility into your external attack surface becomes increasingly complex.

Getting started with Continuous Threat Exposure Management (CTEM)

AI risk and security management is unsurprisingly Gartner’s number one strategic technology trend for 2024. But you might be less familiar with number two: Continuous Threat Exposure Management (CTEM). Coined by Gartner in 2022, CTEM isn’t just another buzzy acronym – it’s a powerful process that can help continuously manage cyber hygiene and risk across your online environment.

How to Spot a Winning NERC CIP Project

The North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) regulations often make exacting demands of Fortra Tripwire's customers, requiring them to update or create new change processes and document those processes in order to comply. In any NERC CIP-centered IT\OT project, there are always crucial indicators of success - even before the project gets underway.

Where Security Starts in Your Security Projects

The successful implementation of new tools and processes hinges not just on the technology itself but on meticulous project management. From ensuring secure access to the underlying infrastructure, a new tool will be implemented upon defining clear goals and understanding the security footprint of the service. Even the earliest steps of your rollout can be important in the long run.

Unified Defense: The Importance of Security Operations Center Integration

As cyber threats continuously evolve, hackers are refining their attack tactics and the frequency of assaults. Over the past several years, 63% of Security Operations Center (SOC) analysts report the size of their attack surface has increased, according to Security Magazine. Similarly, our 2023 Threat Roundup research discovered the enterprise is experiencing 13 attacks every second.

Quick start guide for using Calico policies for Calico Open Source users

Calico policies are a way to enforce network security at the pod level. This blog post will provide a comprehensive overview of Calico policies for Calico OS (Open Source) users. We will cover the basics of Calico policies, including what they are, how they work, and how to use them. We will also provide best practices for using Calico policies and examples of how they can be used in real-world scenarios.

AWS Resilience: 5 Key Strategies and Insights from an Opti9 Cloud Expert

In today’s era of digital transformation, organizations across the globe are under constant threat from a myriad of challenges ranging from cyber threats to human errors and natural disasters. Amazon Web Services (AWS) presents itself as a frontrunner in providing solutions to these challenges, but the true essence of resilience lies not just in adopting AWS, but harnessing its full potential.

What to Expect from a Zero Trust Approach

Every company has a digital presence nowadays. While this brings numerous benefits for businesses, it also poses a number of risks. Cybercriminals are finding more and more ways to circumvent security measures and access data. If protection is not strong enough, the data of organizations, their customers, and partners could be compromised, with dire consequences for companies.