Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Advantages of including an MDR service in your offering

Cyberattacks are evolving and growing more sophisticated, organizations are reacting to this by scaling the cybersecurity solutions they deploy to include services that go beyond threat protection. They are increasingly realizing that other factors such as monitoring and responsiveness are key to protecting their business.

Is it possible to shift on-premises Active Directory to the cloud with AWS Managed Microsoft Active Directory?

I’ve seen this question bouncing about in different forums for quite some time now. I haven’t seen any definitive answers because it always depends on the organization’s use of AD. Recently, I noticed something called AWS Managed Microsoft Active Directory. I must admit, six months ago I was not aware of AWS Managed Microsoft Active Directory, but when I started looking into this cloud-based AD solution, some connections started coming together.

LockBit Takedown: Law Enforcement Disrupts Operations, but Ransomware Threats Likely to Persist

The news that US, UK, and other international law enforcement agencies disrupted LockBit is welcome, as stopping any threat group activity is always a positive. The unfortunate aspect is this blow won’t impact ransomware overall. As in the past, another group will pick up the slack, or LockBit itself will reform and get back into business.

2024's Top GRC Solutions: Finding the Best for Your Business

Implementing an effective governance, risk, and compliance (GRC) framework has become essential for businesses seeking to manage risk and assure regulatory compliance. That’s easier said than done, unfortunately. Given today’s challenging regulatory and security environments, organizations need robust GRC capabilities to align governance, risk, and compliance activities. The key is finding the right GRC platform to meet your specific GRC needs.

Troubleshooting Vulnerability Scan Failures: A Quick Guide

In the digital age, assuring the security and integrity of IT infrastructure is paramount for businesses of all sizes. Vulnerability scanning plays a crucial role in identifying weaknesses in systems and networks, and forms the backbone of any robust cybersecurity strategy. What happens, however, when this critical step fails or encounters issues?

The Cure For Security Alert Fatigue Syndrome

Most security tools waste developers’ time. We’re on a mission to fix this. Application Developers aren't paid to care about security. Their performance is measured by the speed at which they can add value to the business through new features or enhancements. This makes traditional security tools a hindrance as they're not built for developers — plus, they're not designed to be helpful.

Cementitious Vendor-CGM-Network Compromised by 315k Data Breach

Based in Philadelphia, Pennsylvania, CGM is a nationwide cementitious vendor for industries and construction projects. They are a leader in manufacturing, labeling, and distributing custom cement and patching products. CGM also offers solutions for dry cementitious powders, construction liquids, and options for epoxy resins. At their physical facility, they process and package concrete construction products for their vast range of clients.

Navigating complexity in AppSec

Even as the speed of software development increases, security remains a paramount concern. As organizations strive to keep pace with rapid innovation, they grapple with the dual challenge of maintaining agility while ensuring the security of their software products. Enter AppSec on the Move 2024, a pivotal event that promises to shed light on strategies for improving the return on investment (ROI) of application security (AppSec).

Navigating the Intersection of Delegation and Authorization

In the complex world of information management and system administration, two fundamental concepts – delegation and authorization – often intersect to determine how permissions, responsibilities and security are handled. In this blog post, we'll explore the intriguing interplay between delegation and authorization and how they work together to ensure efficient access and secure operations. Delegation: Sharing Responsibility.

WSUS : Windows Server Update Services (WSUS) installation on Windows Server 2022 - Part 2

In the previous article, we covered some fundamental information you should know before installing WSUS in your infrastructure. Just to refresh your memory, WSUS stands for Windows Server Update Service, and it is used for the centralized update and reporting of Microsoft-based products. This includes Windows, Windows Servers, Exchange, SQL, SharePoint, and others.