Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Expert Advice on Prioritizing, Automating and Collaborating for Threat Detection and Response

In a recent panel discussion led by David Neuman, Sr. Analyst with TAG Cyber, ThreatQuotient’s Dave Krasik, Sr. Director of Product Management and Jessica Bair Oppenheimer, Director, Cisco Security Strategic Alliances shared their insights on data-driven security operations. The discussion focused on the challenges and importance of prioritizing, automating and collaborating to detect and respond to threats, and was followed by a demo of the ThreatQ Platform.

Hospital Staffing Solutions Suffers a Data Breach Exposing Over 100K Individuals

Hospitality Staffing Solutions is a short-term employment provider or temp agency that sends workers to a variety of hospitality-related organizations. Companies such as restaurants, hotels, colleges, casinos, senior living, and some light industrial establishments rely on workers provided by the company. The organization employs over 10,000 people and earns an estimated $4.3 billion in revenue annually.

The Use of Natural Language Processing for Identifying and Mitigating Threats

As technology advances, the battle between cyber criminals and organizations intensifies. Cyber threats have become more sophisticated, complex, and widespread, posing a significant risk to the security and integrity of sensitive data. In Q1 2023 alone, the number of global cyber attacks increased by 7%, with an average of 1,248 attacks reported per week.

6 Myths About Cybersecurity Ratings (and 1 Truth)

Today, electricity is so ubiquitous that it’s difficult to perform even basic tasks without it. But when electricity was first introduced, it took decades for broad acceptance and adoption because it was misunderstood and misused. Slowly, the benefits began to outweigh the cons. As with any innovation, there are setbacks, but electricity has overwhelmingly been a force for good. The same can be said about cybersecurity risk ratings. Are they perfect? No.

Vitality MOVEit Data Breach Impacts GuidePoint

The Vitality Group, LLC, a business-to-business vendor that provides employee benefit services to GuidePoint Security, experienced a security vulnerability on May 30, 2023 relating to the third-party file transfer program called MOVEit. The zero-day vulnerability became known in established security networks and channels late on May 31, 2023, and was specifically picked up and identified by internal Vitality security personnel on June 1, 2023.

New SEC cybersecurity rules: Five things every public company CISO should do now

By now you’ve heard about the new cybersecurity rules from the U.S. Securities and Exchange Commission (SEC) requiring public companies to report material cybersecurity incidents and disclose critical information related to cybersecurity risk management, expertise, and governance. Companies will be required to disclose risks in their annual reports beginning on December 15, 2023.

GhostSec's Revelation of Iranian Surveillance Software

GhostSec has reported a successful breach of the FANAP Behnama software, which they describe as the “Iran regime’s very own Privacy-invading software”. This breach has resulted in the exposure of approximately 20GB of compromised software. The group alleges that the Iranian government employs the software for citizen surveillance, representing a significant advancement in the nation’s surveillance capabilities.

Simplify and Secure Applications Across Clouds with the Latest, High-Performance Thunder ADC Images

In today’s hybrid environments, delivering a consistent application experience across clouds, securely, and reliably has become an imperative. The A10 Thunder® Application Delivery Controller (ADC), which comes in multiple form factors, provides the security, performance and availability required for applications in a hybrid cloud infrastructure.