Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Rubrik Recognized as the Winner of 2023 Microsoft US and UK Partner of the Year

Rubrik has won the Business Transformation, Global Independent Software Vendor (ISV) 2023 Microsoft U.S. Partner of the Year award and has been named Microsoft U.K. ISV Partner of the Year 2023. The company was honored among a field of top Microsoft partners for demonstrating excellence in innovation and implementation of customer solutions based on Microsoft technology.

CIS Critical Security Controls 101: Everything to Know About the 18 Controls

The Center for Internet Security (CIS) defines CIS Critical Security Controls as: “A prioritized set of Safeguards to mitigate the most prevalent cyberattacks against systems and networks.” Essentially, CIS Controls are a framework of actions that organizations can take to improve their overall security posture. These controls are organized into categories and updated frequently to address emerging threats and technologies. In this article, we’ll look deeper into all 18 controls.

Deep Web vs Dark Web: What's the Difference?

The main difference between the deep web and the dark web is that the deep web is bigger and used every day by most people without even realizing it. The dark web can only be accessed with the Tor browser and is riskier to access than the deep web. Continue reading to learn more about the differences between the deep and dark web, and how you can keep your information protected from both.

Go Beyond Device Visibility to Prioritize and Act on Cybersecurity Risk

When I joined Forescout as CEO six months ago, I was excited to partner with our strong employees, management team and board as we take the company through its next phase of growth. Today I’m pleased to announce enhancements to the Forescout® Platform that will help customers fully understand the risk posture of their attack surface and enable their security teams to focus on remediating the assets that pose the most risk.

Using insecure npm package manager defaults to steal your macOS keyboard shortcuts

Malicious npm packages and their dangers have been a frequent topic of discussion — whether it’s hundreds of command-and-control Cobalt Strike malware packages, typosquatting, or general malware published to the npm registry (including PyPI and others). To help developers and maintainers defend against these security risks, Snyk published a guide to npm security best practices.

Free CCPA Vendor Questionnaire Template (2023 Edition)

Often regarded as the Californian version of the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA) aims to protect the personal information rights of Californian-based employees, contractors, customers, and vendors. The inclusion of third-party vendors means your Vendor Risk Management program needs to be updated to include CCPA compliance tracking, not only during due diligence but through the entire vendor security posture management process.

CloudCasa Partners With Clastix To Ready Namespace-as-a-Service For Mass Adoption

With Kubernetes, companies have the ability to spin up applications with the click of a button or a declarative one-line command statement. As they spin up the services, they are hosting them within clusters, but they do not really want to deploy multiple clusters for each application or service that they’re looking to host within their website or within their application.

Surveillance: Balancing Fundamental Rights and Personal Privacy

In this thought-provoking video, we delve into the intricate debate surrounding the nature of surveillance and its impact on our fundamental rights. Join us as we examine the arguments that bring us back to square one: the tension between personal privacy and the necessity of surveillance. While some may assert their right to privacy, others argue for the benefits and advantages that surveillance can offer. We explore the influence of AI in optimizing advertising and how it creates a feedback loop of data, leading to targeted ads that seem to anticipate our every move.

SecurityScorecard and the U.S. Chamber of Commerce

This week, SecurityScorecard is participating in the US Chamber of Commerce’s Cyber Security Trade Mission to Israel. This has been a valuable experience to not only share our cybersecurity knowledge, but to learn more about Israel’s cybersecurity efforts, and those of other countries.