Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

ZTNAs Address Requirements VPNs Cannot. Here's Why.

‍ When organizations were forced to shift to remote work during the pandemic, they needed a quick-fix solution that would enable their remote employees to securely access work resources. For many, this solution came in the form of VPNs. However, VPNs were not designed for the bring your own device (BYOD) and cloud app security use cases. While VPNs can provide remote access, it may come as a surprise that they fall short when it comes to security.

TrustCloud Becomes HITRUST Readiness Licensee, to Make HITRUST Accessible and Affordable for Healthcare Technology Companies

TrustCloud's common control framework, programmatic policy mapping and evidence collection and an evidence-viewing portal make readiness and assessment more efficient for both auditors and companies pursuing HITRUST.

The Importance of SSL Certificate for an E-Commerce Website in 2024

With the advent of technological advancement and everyday upgrades, safety measures and security updates have become more than important. Imagine holding a savings account in a bank that explicitly declines to keep your money safe. Or sending sensitive information over a platform that has no end-to-end encryption. Or renting a property that has no lock. Sounds unsafe, right?
Sponsored Post

EventSentry v5.1: Anomaly Detection / Permission Inventory / Training Courses & More!

We’re extremely excited to announce the availability of the EventSentry v5.1, which will detect threats and suspicious behavior more effectively – while also providing users with additional reports and dashboards for CMMC and TISAX compliance. The usability of EventSentry was also improved across the board, making it easier to use, manage and maintain EventSentry on a day-by-day basis. We also released 60+ training videos to help you get started and take EventSentry to the next level.

Continuing the Conversation on Cybersecurity as a Business Risk

Board members often lack technical expertise and may not fully understand the risks associated with cybersecurity. On the other hand, CISOs are more familiar with IT staff and the technical aspects of cybersecurity. This is understandable, as the board is responsible for making high-level decisions and does not typically get involved in the details of implementation and technical audits.

Investigate User-Reported Emails with Ease Through the Powerful Combination of CrowdStrike Falcon Sandbox and KnowBe4 PhishER Plus

The never-ending deluge of phishing emails, malware and ransomware threats can leave incident response and security operation teams (SOC) looking for faster ways to analyze user-reported malicious emails without risking their environments. Manually-triaging every email and being forced to switch between security applications/interfaces only slows response times, increases the chances for human error and means valuable threat intel can be missed.

Small Businesses are Experiencing More Cyber Attacks

As large organizations realize the likelihood of cyber attacks and improve their cyber readiness, small businesses are seeing increases not experienced by their larger counterparts. If I was to tell you that cyber attacks typically focus on larger businesses, you’d likely agree. After all, it just makes sense that the smaller the business, the likelihood that a cybercriminal’s earnings would be smaller. But, according to U.K.

Cybersecurity Expert: AI Lends Phishing Plausibility for Bad Actors

Cybersecurity experts expect to see threat actors increasingly make use of AI tools to craft convincing social engineering attacks, according to Eric Geller at the Messenger. “One of AI’s biggest advantages is that it can write complete and coherent English sentences,” Geller writes. “Most hackers aren’t native English speakers, so their messages often contain awkward phrasing, grammatical errors and strange punctuation.

Data Detection & Response (DDR): From Noise to Signal to Solution

An often-heard concern in cybersecurity is the amount of tools a single organization has to manage to protect its environment from malicious actors, both internal and external. The environments cybersecurity professionals need to secure have grown a lot more complex over the years, as we have adopted new architectural principles and hybrid and multi-cloud infrastructures in the race for a competitive edge.