Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Five Workforce Trends That Intensify Insider Threats

Insider threats don’t often seem like threats at all. They look like colleagues working diligently at the office, logging on to the corporate network from Starbucks or providing a critical third-party service. But insider threats are a big problem that’s getting even bigger and costlier to tackle.

KeeperPAM Report: Deployment During Economic Uncertainty

Keeper Security has released the second part of a series of Privileged Access Management (PAM) research, Privileged Access Management Survey: Deployment Amid Economic Uncertainty, to understand how IT leaders are approaching, deploying and streamlining their PAM solutions. Keeper surveyed over 400 IT leaders globally, focusing on the impact of the global economic downturn on PAM deployments, and what IT leaders are prioritizing in PAM solutions given the current economic climate.

Discover the Pharmaverse: A New Frontier for Clinical Trial Analytics

Imagine an intricate multiverse where each world holds endless possibilities. Now picture that same concept but for pharmaceutical research. Welcome to the Pharmaverse! Similar to the complex world of the multiverse, the Pharmaverse contains various solutions to explore, and each solution can be customized based on your data analysis needs. We first learned of the “Pharmaverse” during Mike Stackhouse’s session at the Egnyte for Life Sciences Virtual Summit. ‍

Shifting Left of Left: Secure Enterprise Data with JFrog Curation

In 2022, nearly 1,700 entities across the globe fell victim to software supply chain attacks, impacting over 10 million people. Nearly each of these attacks included some element of faulty or nefarious open-source code. Software developers commonly rely on open-source components to speed up the development process, but as we can see, this practice has the potential to introduce malicious packages and vulnerabilities into the code due to the lack of proper curation and maintenance.

Becoming FedRAMP and StateRAMP Authorized - Part 1

Cloud-based applications and services are booming in 2023, in both the public and private sector. One of the largest and most sought-after clients for any tech company is the U.S. government. In fact, the federal government is investing billions of dollars annually in transitioning IT resources away from on-premises to secure and cost-effective commercial cloud services such as IaaS (infrastructure as a service), PaaS (platform as a service), and SaaS (software as a service).

Rhysida Ransomware - Detecting a Significant Threat to Healthcare and Other Sectors

The Rhysida ransomware as a service (RaaS) group was first revealed in May 2023. Since then, the group has claimed 41 victims, including some high-profile ones such as the Chilean army and five educational institutions in the U.S. The group is also suspected to be behind the attack against Prospect Medical Holdings, which affected 17 hospitals and 166 clinics in the U.S., although Prospect is not listed as a victim on Rhysida’s website.

Changes to Datadog Cloud Security Management

In order to better meet organizations’ specific requirements for securing their environments, we are making changes to our Cloud Security Management product. On August 1, Datadog introduced new offerings in Cloud Security Management: CSM Pro and CSM Enterprise. Alongside Datadog Cloud Workload Security, these distinct packages provide customers with security capabilities tailored to their particular use cases and needs.

Threat hunting with Sumo Logic: The Command Line

Consider the following scenario: you are asked by your leadership to find dedicated time for threat hunting activities within your network. After some time, access to the shiny new tool of choice is granted and you are super excited to get started. You log into the tool and are greeted with a lovely search bar; how do you proceed from here? The tool presenting the blank search bar is undoubtedly powerful and feature packed.

Vulnerability Management - What you need to know

Vulnerability management (VM) is the process of detecting, prioritizing, remediating, and auditing security vulnerabilities in systems and software. This critical process minimizes the organization’s “attack surface” by installing the most current software updates and properly hardening computer configuration.

Understanding the Fair Credit Reporting Act (FCRA)

The Fair Credit Reporting Act (FCRA) is a U.S. federal law regulating consumer credit information collection, dissemination, and use by consumer reporting agencies. Understanding the FCRA is vital for organizations directly utilizing consumer credit information and individuals who want to exercise their rights over their personal credit information. Monitor your organization’s attack surface and stay FCRA compliant with UpGuard BreachSight >