Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

City of Philadelphia Announces Hack, Potentially Exposing City Emails

Philly is the most populous city in the United States, hosting more than 1.5 million residents within its borders. The City employs around 30,000 people, fulfilling over 1,000 job categories. Recently, the City discovered suspicious activity within its email system, leading to potential information exposures of those with accessible accounts. If you have a city email account, your information could be at risk for misuse.

The Crucial Link, part two

In my last post, I highlighted what organisations can and should do to improve their cyber resilience. Not only will this help them obtain cyber insurance, but it will also help them retain it as well. Another way to improve your ability to meet cyber insurers’ qualification standards is to leverage outside help through managed service provider (MSP) partnerships.

5 Types of Firewalls for Enhanced Network Security

Firewalls form the first line of defense against intrusive hackers trying to infiltrate internal networks and steal sensitive data. They act as a barrier between networks, clearly defining the perimeters of each. The earliest generation of packet-filter firewalls were rudimentary compared to today’s next-generation firewalls, but cybercrime threats were also less sophisticated. Since then, cybersecurity vendors have added new security features to firewalls in response to emerging cyber threats.

The Application Migration Checklist (Updated for 2024)

All organizations eventually inherit outdated technology infrastructure. As new technology becomes available, old apps and services become increasingly expensive to maintain. That expense can come in a variety of forms: Cloud computing is one of the most significant developments of the past decade. Organizations are increasingly moving their legacy IT assets to new environments hosted on cloud services like Amazon Web Services or Microsoft Azure.

12 Best Network Security Audit Tools + Key Features

Fortified network security requires getting a variety of systems and platforms to work together. Security teams need to scan for potential threats, look for new vulnerabilities in the network, and install software patches in order to keep these different parts working smoothly. While small organizations with dedicated cybersecurity teams may process these tasks manually at first, growing audit demands will quickly outpace their capabilities.

Secure Third-Party Connections

Riscosity has joined forces with SecurityScorecard! This new partnership enables SecurityScorecard and Riscosity users to scale their business using only trusted vendors and ensuring that the right data is going to the right place. Together we’re helping compliance and security teams scale their programs, and significantly reduce their applications' attack surface.

Third-Party Security Risks: How to Mitigate Potential Cybersecurity Threats

Cooperation is the key to success, so working with third parties helps your organization increase efficiency, offer better products and services, employ highly qualified experts, and cut costs. But all these benefits come at the price of additional cybersecurity risks. Minor flaws in your third-party vendor’s security and privacy routines may lead to a breach in your organization’s cybersecurity.

WatchGuard Launches MDR Service, Helps MSPs Accelerate Cybersecurity Service Delivery

Amid rising customer demand for MDR, the new offering allows MSPs to offer 24/7 threat detection and response services to customers without the burden of building and managing an in-house SOC.

Ten modern SIEM use cases

Security Information and Event Management (SIEM) protects organizational assets in today's evolving cybersecurity landscape. As threats become more sophisticated, the importance of well-structured SIEM use cases cannot be underestimated. Dive in as we explore the modern approaches to building, organizing, and prioritizing SIEM use cases. Read on to learn the right approach to building SIEM use casesGathering the Right Data for Meaningful Insights The top ten use cases you cannot afford to miss.

User and Entity Behavior Analytics (UEBA) For Enterprise Security

Ever thought about what to do to prevent deadly insider attacks? Even with the implementation of intrusion prevention systems and antivirus software, these threats persist. And their cost has risen by 44% over the past two years. In 2023, insiders have been responsible for the unauthorized leakage of almost 1 billion records. Amid this adversity, user and entity behavior analytics (UEBA) has emerged as a modern enterprise security solution.