Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

NIST CSF: A "Fellowship" for Your Cybersecurity Journey to 2.0

The National Institute of Standards and Technology (NIST) released version 2.0 of the Cybersecurity Framework (CSF) on February 26, 2024. The original version was released in 2014, one year after Executive Order 13636 was signed on February 12, 2013. This executive order was written to improve critical infrastructure cybersecurity, streamline the sharing of threat information, and to drive action towards developing a cybersecurity framework.

Massive China-Linked ID Theft Phishing Campaign Hits Asian Finance Industry

The complex geopolitical landscape in Southeast Asia, influenced by People’s republic of China (PRC)’s strategic interests and territorial disputes, faces a prominent offensive threat from Chinese cyber operations. Southeast Asia’s economic and digital growth make it a prime target for cyber threats. In the past 8 months Cyberint has been able to identify a major large-scale campaign.

The Definitive Guide to Endpoint Data Loss Prevention

Backup and recovery solutions, anti-malware tools, data encryption tools, and network security tools—how much protection is really enough to prevent endpoint data loss? In this article, we’ll go over everything you need to know about endpoint data loss prevention, including the types of DLP, specific activities you can monitor, how endpoint DLP software can help, and more.

LimaCharlie Slashes Incident Response Times With New Bi-directional Capabilities

LimaCharlie introduces a new bi-directional integration platform enhancement, which allows for two-way data flows that streamline detection and response processes while eliminating reliance on third-party automation applications.

What To Know About Endpoint Monitoring in 2024

Today’s workforce is more distributed than ever. Globally, 16% of companies are fully remote, while 40% have a hybrid arrangement. As workforces become increasingly distributed, security leaders face many challenges. They must monitor potential malicious activity across a wide array of devices scattered throughout the entire network. With the rise of endpoint monitoring tools, it has become easier to monitor devices. But challenges remain.

Trustwave Government Solutions (TGS) Salutes New Mexico's New Cybersecurity Executive Order

New Mexico Governor Michelle Lujan Grisham issued an Executive Order to shore up the state’s cybersecurity readiness and better safeguard sensitive data by conducting a state-wide security assessment and adopting National Institute of Standards and Technology (NIST) standards by Nov. 1, 2024.

How a Network Digital Twin Helps Overcome One of the Most Significant IT Challenges: Technical Debt

Rodney Alto served 35 years as a senior executive in technology at the Central Intelligence Agency. He’s now a senior advisor for federal strategy and security at Forward Networks. What is one of largest challenges today in IT? It’s not AI, quantum computing, or even cyber—it’s technical debt.

What Are the Five Pillars of Zero-Trust Security?

The zero trust maturity model is a Cybersecurity and Infrastructure Security Agency (CISA) initiative to help achieve a modern approach of zero trust through the implementation of five pillars with cross-cutting capabilities. The five pillars of zero-trust security are identity, device, network, application and workload and data.

Navigating Cybersecurity Risk Management: Aligning Stakeholder Expectations in Response to Regulations

In light of the SEC's cybersecurity disclosure regulations in the US and NIS2 in Europe, corporate executives and institutional investors are facing a pressing need to align their expectations and improve understanding around cybersecurity risk management. The evolving threat landscape and regulatory environment highlight the importance of cohesive strategies to measure, prioritize, mitigate, and communicate cyber risks effectively.