Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SEC Cybersecurity Disclosure Rules: What You Need to Know

On July 2023, the Securities and Exchange Commission (SEC) implemented a final rule mandating public companies to furnish comprehensive and uniform disclosures pertaining to cybersecurity risk management, strategy, governance, and incidents. We’re going to discuss SEC Cybersecurity Disclosure Rules and What You Need to Know.

Work-From-Home Job Scams You Should Know About

Some common Work-From-Home (WFH) job scams you should be aware of include reshipping job scams, MLM job scams, job placement service scams, envelope stuffing and data entry job scams. Continue reading to learn about the most common work-from-home scams you should be aware of, the signs that point to a work-from-home job scam and how to avoid becoming a victim.

Implement NIST cybersecurity framework with Calico to reduce security risks in Kubernetes environments

According to the CNCF annual survey released in 2022, 96% of organizations are using or evaluating Kubernetes as a platform for their containerized workloads. Containerization has gained popularity as it fosters DevOps culture and provides the agility and flexibility required for faster software release cycles. Kubernetes has crossed the “adoption chasm” to become a mainstream global technology, emerging as the operating system for the cloud.

Moving From Awareness to Action: Living the 4 Themes Cyber Security Awareness Month 2023

October is nearly over, and with it the 20th annual Cybersecurity Awareness Month is coming to a close. As it does, let’s take a moment to review this month’s key themes and provide insight on how to implement any themes that might still be open to-dos.

What is the Probability of a Data Breach?

Cybercrime is on the rise. By 2025, the cost of cybercrime around the world is estimated to escalate to $10.5 trillion, based on a year-over-year increase of 15%. This number represents the potential for the largest transfer of economic wealth in history and exceeds even the total global profits from the illegal drug trade.

City of Philadelphia Announces Hack, Potentially Exposing City Emails

Philly is the most populous city in the United States, hosting more than 1.5 million residents within its borders. The City employs around 30,000 people, fulfilling over 1,000 job categories. Recently, the City discovered suspicious activity within its email system, leading to potential information exposures of those with accessible accounts. If you have a city email account, your information could be at risk for misuse.

The Crucial Link, part two

In my last post, I highlighted what organisations can and should do to improve their cyber resilience. Not only will this help them obtain cyber insurance, but it will also help them retain it as well. Another way to improve your ability to meet cyber insurers’ qualification standards is to leverage outside help through managed service provider (MSP) partnerships.

5 Types of Firewalls for Enhanced Network Security

Firewalls form the first line of defense against intrusive hackers trying to infiltrate internal networks and steal sensitive data. They act as a barrier between networks, clearly defining the perimeters of each. The earliest generation of packet-filter firewalls were rudimentary compared to today’s next-generation firewalls, but cybercrime threats were also less sophisticated. Since then, cybersecurity vendors have added new security features to firewalls in response to emerging cyber threats.

The Application Migration Checklist (Updated for 2024)

All organizations eventually inherit outdated technology infrastructure. As new technology becomes available, old apps and services become increasingly expensive to maintain. That expense can come in a variety of forms: Cloud computing is one of the most significant developments of the past decade. Organizations are increasingly moving their legacy IT assets to new environments hosted on cloud services like Amazon Web Services or Microsoft Azure.

12 Best Network Security Audit Tools + Key Features

Fortified network security requires getting a variety of systems and platforms to work together. Security teams need to scan for potential threats, look for new vulnerabilities in the network, and install software patches in order to keep these different parts working smoothly. While small organizations with dedicated cybersecurity teams may process these tasks manually at first, growing audit demands will quickly outpace their capabilities.