Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Safely Collect and Store Patient Data

With telemedicine, cloud storage, and electronic record-keeping on the rise, patient data has found itself a common target for hackers. As a result, healthcare organizations must adapt and become even more diligent in their protection of sensitive patient and financial data. Fortunately, the right technology and protocols can minimize your risk of attack and help keep your patient data secure. This post covers the most important security factors for collecting and storing patient information.

Data Management on Logsign SIEM: What you must know

Log data plays an unparalleled role in the operation and functioning of a SIEM solution. Or in other words, logs are intrinsic for an effective SIEM solution. Without incoming log data from a variety of different sources in your IT infrastructure, a SIEM essentially becomes useless. In our previous posts, we have explored a variety of features of Logsign SIEM concerning dashboards, reports, search queries, alerts, and behavior definitions.

The Most Disruptive Black Friday Outages of 2019

Major eCommerce businesses experienced technical difficulties on their websites during Black Friday 2019. And this isn’t something retailers can afford, when Black Friday is traditionally the day retailers roll out their biggest online discounts. As Black Friday approaches, many websites will see a spike in traffic which means an increase in bot activity. Are bots hiding in your holiday traffic?

Remote Work, Threat Fatigue, and Budget Constraints: 3 Priorities for Cybersecurity Heading into 2021

Disagreement is one of the defining trends of 2020. However, I think most of us would agree that this year hasn’t turned out to be the kind of year that many of us anticipated when we celebrated on December 31st. Difficulty abounds on many fronts, reducing our ability to operate with precision and excellence. For companies balancing concerns about employee health, adjusting to a new hybrid workforce, and responding to shifting consumer demands, the challenges are many.

Using Open Policy Agent to safeguard Kubernetes

Open Policy Agent addresses Kubernetes authorization challenges with a full toolkit for integrating declarative policies into any number of application and infrastructure components. As more and more organizations move containerized applications into production, Kubernetes has become the de facto approach for managing those applications in private, public and hybrid cloud settings.

Image scanning for Google Cloud Build

In this article, you will learn how to add inline image scanning to a Google Cloud Build pipeline using the Sysdig Secure DevOps platform. We will show you how to create a basic workflow to build your container image, scan the image, and push it to a registry. We will also customize scanning policies to stop the build if a high-risk vulnerability is detected.

A New Framework for Modern Security

We are in the midst of an unprecedented convergence of events that are forcing enterprises to dramatically change how they secure their modern businesses. With the acceleration of digital transformation from COVID-19, work-from-home initiatives, the continued growth of SaaS and the increasing adoption of microservices-based applications, the modern enterprise threat landscaping is transforming rapidly.

It's All About Access: Remote Access Statistics for Public Cloud Workloads

“The more things change, the more they stay the same.“ In the recent Equinix breach in September 2020, 74 RDP servers were exposed to the Internet. Any publicly exposed ports are a risk but remote access protocols such as RDP have had their share of critical vulnerabilities (e.g., BlueKeep in 2019).

Insider threats: What are they and how to prevent them

Companies need to establish a secure system to avoid insider threats and other online issues that could destroy a business. There are different online threats that businesses face every day. The most common of which is phishing attacks were the victim accidentally clicks on an unsafe link and log in. Other commonly known threats to businesses are malware, ransomware, weak passwords, and insider threats. Most of these online attacks are due to what is known as insider threats.