Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Stay Compliant with the New HIPAA Security Rule Updates

The Health Insurance Portability and Accountability Act (HIPPA) was established to protect patient privacy and secure health information. While it has been around for nearly two decades, it is evolving to keep up with an increasingly digital world and in response to the skyrocketing number of cyber attacks the industry sees every year.

Cloud SIEM and Flex Logs: Enhanced security insights for the cloud

One of the primary challenges with developing in the cloud is knowing which areas of your environment are vulnerable to risks. In order to efficiently identify and respond to legitimate risks, you need real-time visibility into security events. But traditional security platforms are costly and often standalone, which means they may create gaps in visibility.

Get Ready for the 2025 Trustwave Risk Radar Report - Hospitality Sector

Trustwave SpiderLabs’ upcoming report, the 2025 Trustwave Risk Radar Report: Hospitality Sector, will be released on May 21 and will delve into the latest threat landscape, highlighting critical vulnerabilities and offering actionable insights to help hospitality businesses stay secure. The report notes that the hospitality industry has become a prime target for cybercriminals, with threats growing in volume and sophistication.

Ransomware Response Plan: What Steps Schools and Libraries Should Take After an Attack

In Part 1 of this blog series The Ransomware Threat: Preparing Schools and Libraries for Ransomware Attacks, we discussed creating a pre-incident plan that includes a backup process, asset management, identity and access management, risk-based vulnerability management, and security awareness training to minimize the risk of ransomware attacks.
Featured Post

Why Conventional Disaster Recovery Won't Save You from Ransomware

The conventional formula for maintaining business continuity in the face of unexpected IT disruptions is as follows: Back up your data. Make a recovery plan. Test the recovery plan periodically. That approach may work well enough if your primary concern is defending against risks like server failures or data centre outages caused by natural disasters. But in the present age of widespread ransomware attacks, conventional backup and recovery planning aren't always enough.

How to Integrate NDR Capabilities into a Comprehensive Security Platform

Network security has moved beyond conventional perimeter defenses. Organizations are now faced with more advanced threats requiring advanced detection and response capabilities. With effective Network Detection and Response (NDR), visibility is increased, and your digital environment is protected. This guide shows how to add NDR to your security platform. It covers common challenges and uses automation to boost effectiveness.

Understanding Market Dynamics in Pre-IPO Investment Decisions

Looking to secure your stake at the start of the next major breakthrough? Investments in Pre-IPO companies can deliver significantly larger returns compared to traditional public market investments. The current investment environment has led to unprecedented numbers of retail investors attempting to purchase private company shares before they become publicly available. The appeal is obvious.

What Is Jenkins? Features, Benefits & Core Concepts

Jenkins is an open-source automation server that is widely used for continuous integration (CI) and continuous delivery (CD) in software development. It is an automated engine that builds, tests, and deploys the application so that development teams can routinely integrate code changes in a way that ensures the software is deployable. Created as the Hudson project in 2004, Jenkins has grown to become an infinitely extensible and customizable tool hosting an enormous ecosystem of plugins.

The Benefits of Shifting Left: Minimize Risk and Save Money with Early Security Integration

Shifting left in security, or integrating security early in the software development lifecycle (SDLC), can help your organization save time and money. By identifying and addressing potential security flaws early, organizations can reduce the likelihood of vulnerabilities being exploited in production applications. This proactive approach is more cost-effective and time-efficient, as it prevents the accumulation of technical debt and minimizes the need for extensive rework or redesign.

SOAR & DSDL: Crossover for Agentic AI Workflow

Recently we released the Splunk App for Data Science and Deep Learning (DSDL) v5.2.0. This update introduced new features for integrating large language models (LLMs) and retrieval-augmented generation (RAG). With DSDL v5.2.0, users can easily perform LLM prompts, vector searches, RAG, and function calling directly from the app's dashboards.