Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

I Need 90 PoPs of SASE...Stat!

Healthcare information security teams are tasked with a common responsibility: safeguarding devices, services, and patient data; however, they also deal with the unique regulatory and compliance requirements surrounding patient data. Compounding this challenge is the sheer number of branch offices, connectivity to internal- and cloud-based applications, and all of the disparate point products accumulated over time.

Effective Identity Threat Response with Teleport

With the rise of infrastructure complexity, organizations must improve their strategies to quickly investigate and mitigate unauthorized system access and internal identity threats. Teleport has already highlighted the importance of identity threat detection and response and introduced features to support security incident containment. This article builds on these ideas by presenting additional metrics to detect suspicious employee behavior and options for expanding detection capabilities.

Build Better Vulnerability Management with Threat and Vulnerability Intelligence

The goal of every vulnerability management program is to reduce the risk posed by vulnerabilities that exist in the organization’s environments. You can achieve this goal in two ways. The first is to move faster, remediating vulnerabilities faster than they can arise. The problem with this approach is that it doesn’t work. It is inefficient, expensive, and impractical. There are simply too many vulnerabilities.

The Key Benefits of Adopting Zero Trust IoT for Device Identity Lifecycle Management

Understanding Zero Trust IoT Zero Trust IoT is a security model that requires every device to verify its identity and security before accessing any network resources. In simpler terms, it means that no device is automatically trusted, regardless of where it is connecting from. This approach helps to prevent unauthorized access and potential security breaches. With Zero Trust IoT, each device must continuously prove its trustworthiness, adding a layer of security to networks and data.

What's the buzz about NIS 2?

The latest version of the Network and Information Security Directive (NIS 2) has severe implications for companies that provide services or carry out activities in the European Union (EU). NIS 2’s goal is to establish a higher level of security and cyber resilience for member EU states in 18 essential industry sectors. Violations can lead to substantial fines, legal liability and even criminal sanctions on an individual level.

How to Choose the Right Managed Detection and Response Solution to Secure Your Supply Chain

AI isn’t what’s going to be the hot topic of the next year; it’s going to be data breaches in the supply chain and the cost that companies face by not reacting quickly to this emerging threat. The cyber attack on Change Healthcare, one of the world’s largest health payment processing companies, illustrates this point. Change Healthcare was a clearing house for 15 billion medical claims annually—accounting for nearly 40% of all claims.

Fix key cloud security risks with version 2 of the Essential Cloud Security Controls Ruleset

Cloud security teams are faced with an ever-increasing number of challenges. Attackers are focusing on more cloud-native attacks than ever. Meanwhile, the number of cloud service offerings—and by extension, the number of misconfigurations in them—is only growing. And there is always the risk that a sophisticated adversary could abuse a vulnerability in a cloud service provider to target cloud customers.

How To Stop MFA Fatigue Attacks

As organizations continue to digitize and passwords proliferate across systems, applications, and even assets, identity and access management (IAM) has become a pillar of cybersecurity. One component of IAM has become ubiquitous with access security: multi-factor authentication (MFA). MFA is an access control technique that adds a layer of security to user logins and access by making the user verify their identity.