Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Encryption at rest in Elastic Cloud: Bring your own key with AWS KMS

In the previous blog of this series, we unpacked the foundational concepts of encryption at rest and introduced you to Elastic Cloud’s “bring your own key” (BYOK) feature, which allows you to do encryption at rest with encryption keys managed by the KMS service of your cloud provider.

$75 Million Record-Breaking Ransom Paid To Cybercriminals, Say Researchers

The staggering sum of US $75 million has reportedly been paid to a ransomware gang in what is believed to be the largest known ransom payment made by a cyber attack victim since records began. Researchers at Zscaler claim in a new report that the record-breaking figure was paid by an undisclosed Fortune 50 company to the Dark Angels ransomware group.

Sharing Passwords via Email? What You Should Do Instead.

If you’re tempted to share a password over email, there are several security risks you should be aware of before doing so. Sending passwords over email is dangerous because emails are unencrypted and can be intercepted by cybercriminals. When data is unencrypted, it could be read or saved by the wrong or malicious recipients. Read on to learn why sending passwords through email is risky and how you can use a password manager to safely share your passwords instead.

Data Loss Prevention Strategy: From Reactive to Proactive

In today’s data-driven world, safeguarding sensitive information is paramount. A well-crafted Data Loss Prevention (DLP) strategy acts as a shield, protecting your organization from costly data breaches and reputational damage and ensuring you meet regulatory requirements. Following a step-by-step guide ensures you cover all the essential bases, from selecting a loss prevention policy that aligns with your needs to conducting regular security audits.