Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CMMC vs NIST 800-171

January 2020 is when the Department of Defense (DoD) released the Cyber Maturity Model Certification (CMMC) framework, aimed at evaluating and strengthening the cybersecurity readiness of the Defense Industrial Base (DIB). As per the DoD’s directive, all prime contractors and subcontractors within the supply chain must undergo auditing and certification under the CMMC framework.

Top tips: Watch out for these 4 machine learning risks

Top tips is a weekly column where we highlight what’s trending in the tech world today and list ways to explore these trends. This week, we’re looking at four machine learning-related risks to watch out for. Machine learning (ML) is truly mind-blowing tech. The very fact that we’ve been able to develop AI models that are capable of learning and improving over time is remarkable.

Uncovering identity threats: Lessons learned from a real-life data breach

Every IT admin, regardless of the company size or employee count, shares a common fear: data breaches. The horror of discovering their organization’s data exposed on the dark web, accessible to anyone, is definitely a nightmare. So, IT admins are on the constant lookout for leading solutions that protect access to organization data and manage employee identities effectively. But where does the real challenge lie? In managing the employee identities, or their access to data?

How to Threat Hunt in Amazon Security Lake

Establishing a proactive security posture involves a data-driven approach to threat detection, investigation, and response. In the past, this was challenging because there wasn’t a centralized way to collect and analyze security data across sources, but with Amazon Security Lake it is much simpler.

CVSS 4.0 Is Here: What Security Leaders Need To Know

The Common Vulnerability Scoring System (CVSS) is used to evaluate and communicate the technical severity of software, hardware and firmware vulnerabilities. While CVSS has been around for nearly 2 decades and now stands as an industry standard tool for scoring the severity of a vulnerability, the framework still has its limitations. To mitigate some of these challenges and improve the efficacy of the system, an updated version of CVSS was released in November 2023.

Why the CISO Has Become the Chief Storytelling Officer

The role of the Chief Information Security Officer (CISO) has undergone a transformation as profound as the threats we face. Between new regulations such as SEC, NIS2, and DORA, the explosion of generative AI, and the rapidly expanding attack surface, the burden is now on cybersecurity leaders to not only protect the organization but build confidence with customers, regulators, board members, and other stakeholders. The key to building trust? Storytelling.

Enhancing Employee Monitoring with Ekran System's Brand-New Dashboards

Effective employee monitoring is essential for maintaining productivity and security, especially in heavily regulated industries like finance, government, and healthcare. That’s why at Ekran System we are continuously working to enhance our product’s monitoring functionality. Now Ekran System is introducing new informative and user-friendly dashboards that will help you streamline your insider threat prevention and productivity management efforts.

Cyber Security Stats 2024: A Look Inside a Typical SOC

What tools does the average security operations centre (SOC) use in 2024? What gets in the way when they deploy a new tool? And how stressed are security pros really? These were just some of the questions we wanted to find out the answer to when we partnered with OnePoll at the end of 2023/the start of 2024. Together, we surveyed 250 British and Irish Heads of IT at companies with 500+ employees. Here’s what they said.

5 Common Cybersecurity Blunders Often Made by Commercial Enterprises

Big businesses carving out their place in the digital age find themselves in a constant battle against cybersecurity threats. Despite their access to state-of-the-art technology and substantial financial resources, these commercial giants are not impervious to attacks. The complexity of their networks and the voluminous data they handle magnify their attractiveness as targets for cybercriminals.

What is SSPM and do you need it in your stack?

SaaS adoption has skyrocketed, offering organizations undeniable advantages. But beneath the surface lurk overlooked configuration errors. Misconfigured SaaS settings create security gaps. Broad permissions, weak defaults, and forgotten accounts jeopardize your security. These issues act as open doors for breaches and unauthorized access. The sheer scale of the problem is staggering – 70% of company software now resides in the cloud.