Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Monitor highly regulated workloads with Datadog's FIPS-enabled Agent

Protecting sensitive data from the threat of exposure is a non-negotiable business imperative for organizations, especially those in highly regulated sectors like government and healthcare. To help organizations keep their data secure, the National Institute of Science and Technology (NIST) developed a set of requirements for the hardware and software components responsible for data encryption.

Exposed Server Headers and Cybersecurity Risk

Your web server conveys a variety of information to the client when a visitor opens your website. They can access specific policies you've set and sometimes identify what kind of software you use to run your system. Sometimes, that's okay. Other times, the information exposed in your server header can lead directly to a malicious cyber attack.

How Self-Learning AI Has Helped CARIAD Build An Automotive Software Powerhouse

CARIAD has been building one unified software platform for all Volkswagen brands to provide them with reliable software and digital best practices. In recent years, CARIAD and the rest of the automotive software sector faced extensive industry regulation and an array of dangerous and costly vulnerabilities. By introducing feedback-based fuzzing, an advanced white-box testing method that uses self-learning AI to uncover deeply hidden bugs and security vulnerabilities, CARIAD was able to find and fix potentially dangerous issues early in the development process.

Falcon Identity Protection Unified Identity Protection for Hybrid Environments: Demo Drill Down

Today’s adversaries exploit identity weaknesses across on-premise, Microsoft Entra ID (formally known as Azure AD), and hybrid environments. CrowdStrike Falcon Identity Protection delivers complete visibility and protection across your entire hybrid identity environment.

Decoding Essential 8 Compliance: Tanium's Unique path to Success

From Tanium's Australian bureau, we dive into the Essential 8 baseline mitigation strategies and reveal how Tanium's unique architecture goes beyond the traditional approach of other vendors and enables organisations to overcome key challenges to help them successfully achieve automated continuous compliance.

Identity Threat Hunting: How CrowdStrike Counter Adversary Operations Is Leading the Charge

It’s 10:30 p.m. and you’re heading to bed. Unfortunately, a threat actor has your organization in their crosshairs. While you’re brushing your teeth, they’re crafting a social engineering email to pilfer your employees’ credentials. While you’re putting on your pajamas, they’re finding a path to log in. While you’re asleep, is your organization protected?

How To Know if Your Smart TV Was Hacked and What To Do

You can tell your smart TV has been hacked if you notice unusual activity on your smart TV, strange popup windows, changed privacy and security settings, slow performance and unauthorized access to your accounts. Surprisingly, smart TVs can get hacked just like any other Internet of Things (IoT) device that connects to the internet. Cybercriminals can hack your smart TV to spy on you or infect other devices on the same network. You need to secure your smart TV to protect it from hackers.

Ransomware Hits Kentucky Healthcare Network, Exposing Data of 2.5 Million

Norton Healthcare consists of over 430 locations between Kentucky and Indiana. The clinics meet over two million a year, including adult and pediatric patients. The hospital offers one of the largest not-for-profit healthcare systems in the region and employs over 25,000 faculty members. Norton Healthcare is a community powerhouse in the region; this makes their announcement of a data breach all the more disturbing.