Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

Get smart and stay safe: Best practices to protect you from digital financial fraud

The past two years have seen a 391% rise in fraudulent attempts that target digital transactions around the world. The research carried out by TransUnion also saw a specific increase of 347% in relation to account takeover so the average consumer needs to up their understanding of financial fraud risks. When data breaches and cyberattacks occur, it impacts society in various ways like lowering consumer trust and damaging foreign politics.

How Tripwire Custom Workflow Automation Can Enhance Your Network Visibility

Tripwire Enterprise is a powerful tool. It provides customers insight into nearly every aspect of their systems and devices. From change management to configuration and compliance, Tripwire can provide “eyes on” across the network. Gathering that vast amount of data for analysis does not come without challenges. Customers have asked for better integration with their processes and third-party tools.

Achieving Compliance with Qatar's National Information Assurance Policy

Qatar is one of the wealthiest countries in the world. Finances Online, Global Finance Magazine and others consider it to be the wealthiest nation. This is because the country has a small population of under 3 million but relies on oil for the majority of its exports and Gross Domestic Product (GDP). These two factors helped to push the country’s GDP measured at purchasing power parity (PPP) to over 132,886, per Global Finance Magazine’s findings in August 2020.

Extend Your Fortinet FortiManager to Kubernetes

Companies are leveraging the power of Kubernetes to accelerate the delivery of resilient and scalable applications to meet the pace of business. These applications are highly dynamic, making it operationally challenging to securely connect to databases or other resources protected behind firewalls.

How to Safely Collect and Store Patient Data

With telemedicine, cloud storage, and electronic record-keeping on the rise, patient data has found itself a common target for hackers. As a result, healthcare organizations must adapt and become even more diligent in their protection of sensitive patient and financial data. Fortunately, the right technology and protocols can minimize your risk of attack and help keep your patient data secure. This post covers the most important security factors for collecting and storing patient information.

Data Management on Logsign SIEM: What you must know

Log data plays an unparalleled role in the operation and functioning of a SIEM solution. Or in other words, logs are intrinsic for an effective SIEM solution. Without incoming log data from a variety of different sources in your IT infrastructure, a SIEM essentially becomes useless. In our previous posts, we have explored a variety of features of Logsign SIEM concerning dashboards, reports, search queries, alerts, and behavior definitions.

The Most Disruptive Black Friday Outages of 2019

Major eCommerce businesses experienced technical difficulties on their websites during Black Friday 2019. And this isn’t something retailers can afford, when Black Friday is traditionally the day retailers roll out their biggest online discounts. As Black Friday approaches, many websites will see a spike in traffic which means an increase in bot activity. Are bots hiding in your holiday traffic?

Remote Work, Threat Fatigue, and Budget Constraints: 3 Priorities for Cybersecurity Heading into 2021

Disagreement is one of the defining trends of 2020. However, I think most of us would agree that this year hasn’t turned out to be the kind of year that many of us anticipated when we celebrated on December 31st. Difficulty abounds on many fronts, reducing our ability to operate with precision and excellence. For companies balancing concerns about employee health, adjusting to a new hybrid workforce, and responding to shifting consumer demands, the challenges are many.

Using Open Policy Agent to safeguard Kubernetes

Open Policy Agent addresses Kubernetes authorization challenges with a full toolkit for integrating declarative policies into any number of application and infrastructure components. As more and more organizations move containerized applications into production, Kubernetes has become the de facto approach for managing those applications in private, public and hybrid cloud settings.

Image scanning for Google Cloud Build

In this article, you will learn how to add inline image scanning to a Google Cloud Build pipeline using the Sysdig Secure DevOps platform. We will show you how to create a basic workflow to build your container image, scan the image, and push it to a registry. We will also customize scanning policies to stop the build if a high-risk vulnerability is detected.