Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Cloud Security Posture Management

Arctic Wolf Cloud Security Posture Management security operations identify cloud resources at risk and provide guidance on hardening their posture, simplifying cloud security. Arctic Wolf Cloud Security Posture Management was built to make sure nothing gets missed; to give you greater context into your cloud platforms, identify gaps, and deliver posture hardening recommendations to keep your information safe.

Arctic Wolf Managed Risk

Arctic Wolf Managed Risk enables you to discover, benchmark, and harden your security across your networks, endpoints, and cloud environments. At the core of Arctic Wolf Managed Risk is our Concierge Security Team, providing you with personal security experts who deliver a quantified, real-time understanding of your cyber risk. From technical vulnerabilities like software defects and system misconfigurations, to unsafe practices like reusing passwords, our Concierge Security Team helps focus your team’s efforts to quickly improve your security posture and reduce risk.

The 443 Podcast Episode 215 - CISA's Cybersecurity Performance Goals

This week on the podcast we cover CISA's freshly-released Cybersecurity Performance Goals (CPGs) designed to help smaller organizations bridge the gap between frameworks and practical implementation. After that, we discuss a new bill working its way through the US Senate designed to address open source software security risks. Finally, we end with a research post from Microsoft on the evolution of an interesting malware campaign.

The Simply Cyber Report: October 31, 2022

The top cyber news stories you need to know about right now. Microsoft Security Threat Intelligence is reporting on the Raspberry Robin worm, having infected at least 3000 systems across 1000 organizations at time of this report. First reported by Red Canary in September, Raspberry Robin is spread via USB drive (yes this is still a viable attack vector, and very similar to how Stuxnet initially kicked off). It has very similar technical behavior to the FakeUpdates malvertising campaigns.

FORTUNE-Favored Data Protection Services for Financial Institutions

FORTUNE-recognized data privacy and protection solutions allow financial institutions the tools and security to improve data storage, flows, and protected usage within minutes. Discover how Protegrity Vautless Tokenization works wonders for organizations, and check out our finance-catered data protection solutions today.

Customizing your controls

We know that your business is unique, and you may already have security and privacy programs in place, so we’ve made customization a focus and a pillar in our platform, making it effortless for you to craft custom controls and policies that are integral to your business. On the control details page in TrustOps, you now have the ability to edit a control and customize the control statement language, policy mappings and frequency of the control to accurately reflect your business practices.

Add Your Brand Identity to Your TrustShare

With this update, we’ve made it easy for your team to customize your TrustShare portal to reflect your brand identity. As part of the most recent update to the TrustShare Admin app, we’re excited to introduce a “Branding” section where you can select your brand’s color palette and add your logo. Your TrustShare will reflect your branding in the appropriate places as soon as you publish your selections. You also have the ability to preview changes before publishing, so you can ensure that everything looks and feels right.