Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

5 Things to Consider Before Buying a File Integrity Monitoring (FIM) Solution

Imagine you’re on the tail end of installing a 100-line script. It’s five o’clock, and you’re ready to head out early for once. You run the startup script on a new server, and then – the fated error message. Something isn’t working, and only after painstakingly reviewing 67 lines of code do you realize you had the IP address wrong. This could have been prevented.

Hypothesis-Driven Cryptominer Hunting with PEAK

Hypothesis-driven hunting is probably the most well-known type of threat hunting, and it’s one of the three types defined in the PEAK threat hunting framework. In this article, we’ll walk through a sample hypothesis-driven hunt, step-by-step. For our data, we’ll be using the Boss of the SOC Version 3 (BOTSv3) dataset, which you can use to recreate the hunt and work through it on your own. Below is a diagram of the Hypothesis-Driven hunting process.

How to Avoid 'Execute as Admin' Deficiencies on Audit

Most customers come to Netwrix in anticipation of going public or in preparation for audit after an IPO. Recently, however, an increasing number of public companies are purchasing our products after failing an audit or receiving a warning of material deficiencies. The good news is that, in all cases, the main challenges are entirely avoidable without a great deal of work.

Best Practices for Managing Salesforce Data Security and Compliance

It shouldn’t be a shock to point out that data breaches carry a huge reputational risk — one that almost always impacts the bottom line. As we can see from any number of recent, highly publicized incidents, not taking data security seriously can result in serious consequences.

SOX Compliance In Salesforce: What's In Scope And How To Make It Simple

It is increasingly common for Salesforce Orgs to be in scope for SOX. Auditors are concerned about revenue-related data and critical business processes on the platform. The problem is that Orgs are complex, often highly customized, and much of what auditors are most concerned about is hidden away in custom objects or very difficult to track.

What You Should Know About SOC 2 Compliance

SOC 2 – which stands for System and Organization Control 2 – is a cybersecurity compliance framework that specifies how third-party service providers should store and process organizational and client data. SOC 2 is part of the American Institute of Certified Public Accountants’ (AICPA) SOC reporting framework and utilizes the AICPA Statement on Standards for Attestation Engagements No. 18 (SSAE 18) standard.

How To Stay Safe From Gift Card Scams

You can stay safe from gift card scams by checking gift cards for physical tampering before purchasing them and avoiding requests that ask you to purchase gift cards as a form of payment. While gift cards are a common gift that many people choose to give each other, they are also commonly used by scammers for financial gain. According to the Better Business Bureau, gift card scams increased 50% from 2022 to 2023 with losses from January to September 2023 totaling $147 million.