Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

FedRAMP and StateRAMP Authorized Part III: The Journey to FedRAMP is Arduous - When and Why Should You Bother?

You’re in your company’s go-to-market meeting. You’re excited about a new cloud application your team is developing. Your leaders are trying to understand the application’s market and ideal clients. Someone in the room suggests, “We should sell this to government agencies.

Securing IaaS, PaaS and SaaS with a Cloud SIEM

As cloud computing continues to expand with no end in sight, it’s only wise to invest in it. Infrastructure-as-a-Service, Platform-as-a-Service and Software-as-a-Service bring significant cost savings (personnel and ownership), improved performance, better reliability, freedom to scale and significant security benefits. It’s no wonder many businesses have already adopted all three of these models.

Focus on these 3 Areas to Develop a Strong Cybersecurity Posture With Fewer Resources

Not every organization's security apparatus is built or funded at the same level. For smaller organizations or those with other needs competing for budget, here are some points that show it's possible to do more with less. To drive meaningful progress and ensure a robust security posture, it's the C-suite and the board must collaborate and focus on three key areas: coverage, consolidation, and assurance.

HCA Healthcare's Hacking Catches the Attention of the Department of Health and Human Services

HCA Healthcare is a national and international healthcare service provider. Their services span over 180 hospitals and thousands of clinics across 20 states. They also offer services in the United Kingdom called HCA UK. Around the world, more than 290,000 people work for HCA; their payrolls include the staff of surgery and urgent care centers, imaging and physician clinics, and more. Back in July, HCA Healthcare suffered a hack exposing the data of more than 11 million Americans.

What is Vulnerability Remediation?

Due to the increasing frequency and impact of cybersecurity threats, vulnerability management has become a heightened priority for many organizations. While businesses often focus on vulnerability assessments when developing their vulnerability management programs, assessments are only the first step in a holistic cybersecurity threat mitigation strategy. One aspect of vulnerability management that is often overlooked is vulnerability remediation.

SASE Transformation: 6 Scenarios Demanding Modern SD-WAN

The following is derived from the new book, Modern SD-WAN for SASE for Dummies, Netskope Special Edition. Click here to get your complimentary copy. For decades, computer networking has powered our businesses, our communities, and our lives. As computing and the digital world have evolved, enterprise networking has struggled to keep up. Local area networks (LANs) gave way to MPLS WANs and MPLS WANs gave way to SD-WANs. Out with the old, in with the new.

Why Dependency Management Reduces Your Enterprise's Technical Debt

There are many ways to incur technical debt but the broadest reason it both exists and persists is that most applications are old and most software developers are working on new things. In an ideal world, agile organizations would have very little technical debt because they should always return to their code and improve it. But in the real world, the fast pace of continuous rollouts means agile organizations can be especially prone to collecting large amounts of technical debt.

Nurturing a Resilient Security Culture: An Insider's Perspective

Cybersecurity is a complex and multifaceted arena. However, one element stands out as a crucial aspect in this field—cultivating and maintaining a robust security culture. Often underestimated in conversations, it nonetheless forms the bedrock of a secure environment.

Learning about Saudi Arabia's Personal Data Protection Law and the compliance solution

The Saudi Data and Artificial Intelligence Authority (SDAIA) has decided its’ about time to call for the Kingdom of Saudi Arabia’s first data protection law. The Personal Data Protection Law (PDPL), originally included a public consultation component when it was launched by SDAIA in late 2022. Since then, the public consultation was withdrawn, and the draft version of the data protection law augmenting PDPL was issued.

Overcoming Cybersecurity Headwinds Part 3: Future Proofing Your TPRM Program

Welcome back to our Overcoming Cybersecurity Headwinds blog series—building on our latest webinar about third party risk with Marc Crudginton, CISO at Howard Hughes Corporation. In our previous blogs, we explored the wisdom of centralizing cyber risk management and automating third-party risk management (TPRM). Today, we will focus on future proofing your TPRM program.