Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SOC 1, 2, 3 Compliance: The 2023 Guide to Understanding & Achieving SOC Compliance

Imparting your data to an organization, whether you are a private individual or another organization yourself, requires an incredible amount of trust. How can you be sure that they will handle your sensitive information properly? For specific industries, stringent standards and regulations are in place to ensure cybersecurity. For example, HIPAA for healthcare and PCI DSS for payment card processing companies reassure customers and companies that data is protected.

Malicious Packages Special Report Reveals 315% Spike in Attacks

Today’s attackers aren’t just exploiting vulnerabilities — research from Malicious Packages Special Report: Attacks Move Beyond Vulnerabilities illustrates the growing threat of malicious packages. According to the report, the number of malicious packages published to npm and rubygems alone grew 315 percent from 2021 to 2022.

Australia Set to Reform Cybersecurity Rules

Australia is leading the way when it comes to improving overall cybersecurity for the country. The government recently announced the Australian Cyber Security Strategy aimed at improving IT infrastructure to maintain a high level of security for agencies, businesses, and users. Their goal is to create the most cyber secure nation in 2023.

Customize rules for detecting cloud misconfigurations with Datadog Cloud Security Management

For organizations in highly regulated industries, any misconfiguration in their cloud environments can be detrimental to customer trust and privacy if overlooked. To mitigate this risk, DevOps and security engineers follow recognized compliance standards to quickly surface issues in their AWS, Azure, or Google Cloud environments. Organizations can take this work a step further by developing detection rules tailored to their unique business or security goals.

Oracle's Arthur Barnes: The evolution of cybersecurity and solving the challenge of hiring the right team

In this episode of the Future of Security Operations podcast, Thomas interviews Arthur Barnes, Senior Director of Security Operations at Oracle – the world’s largest database management company. Arthur is an experienced cybersecurity leader with 20 years of experience, having previously worked at Pearson, Dell, and M&S.

Foresiet Discovers Data Breach of Texas Healthcare Company

In a recent dive into the deep web, Foresiet, the cyber security firm has made a shocking discovery. Our team has uncovered a massive data breach of a healthcare company in Texas, US. The data breach has resulted in the exposure of sensitive patient information and has left the affected patients vulnerable to identity theft and other serious consequences. The Breach Details During our deep web exploration, we stumbled upon a downloadable link to the breached data.

Top 5 uses of blockchain in supply chain

It’s April, designated National Supply Chain Integrity month by CISA, NCSC, ONCD and Department of Defense, to promote resources, tools, and information to help organizations and agencies secure their supply chains and build resilience. But what role does blockchain play in supply chain and how easy is it to implement? Blockchain technology has numerous potential applications in supply chain due to its ability to provide a secure, transparent, and tamper-proof ledger of transactions.