Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

Elastic SIEM is free and open for security analysts everywhere

Security teams must protect attack surfaces that are becoming bigger and more distributed due to the growth of remote work, cloud infrastructure, and other dynamics. These teams understand that meeting this challenge at scale requires the successful incorporation of the appropriate technology into their security operations program.

Use the Node.js HTTP Module to Make a Request

The ecosystem around making requests in Node.js applications is huge. With countless libraries available, it can be helpful to understand why they exist. This helps to improve your understanding of Node.js as a whole, and makes choosing an HTTP client easier. In the first post in this series, we looked at creating servers using Node's http module. In this post, we will explore making a request using the http.request method and handling the response.

Coronavirus Impact on Cyber Security

The Coronavirus (COVID-19) pandemic is increasing tremendously and disrupting the global health at large extent, in addition to the damages to economics, social and political systems. More importantly, the digital world is also on the verge of destruction because, due to this menace, the people at large scale are compelled to work remotely and doing so will make them rely heavily on remote communication and digital tools.

Should you be worried about false negative insider threats?

The consistent rise in Insider Threat-related incidents has led to a growing focus and investment in proactively detecting these threats. According to reports, 60% of organizations discovered one or more insider attacks last year, and 90% admitted that they felt vulnerable to insider attacks. Reports also show that it takes an average of over two months to contain an insider attack.

What Are SOX Compliance Requirements?

The Sarbanes-Oxley (SOX) Act was signed into law on July 30, 2002. The law drafted by congressmen Paul Sarbanes and Michael Oxley aimed to improve corporate financial governance and accountability while protecting shareholders from accounting errors and fraudulent activity. The real fuel for the SOX law came from the inappropriate financial conduct of three large companies Enron, Tyco, and WorldCom.

The future of cybersecurity for connected cars

Connected cars have slowly become mainstream, with more than 700 million of them expected to be operating on roads by 2030. Most new vehicles are leaving production lines with a host of features that require a connection to the online world, including GPS, lane assistance, collision avoidance, and modern infotainment systems. However, while connected vehicles offer abundant opportunities for the consumer, automakers need to seriously consider what they mean for consumer privacy and security.

Working from Home Security Tips for Staff and Employers

While over 70 percent of global employees work remotely at least once per week and full-time remote workers are increasingly common, there are still aren't a lot of resources that help address the cybersecurity risk introduced by remote work. In the past, workplaces that weren't set up to work remotely, simply didn't.

What is Transport Layer Security?

Transport layer security (TLS for short) refers to a protocol that aims to offer authentication, data integrity and privacy during the communication between two different computer applications. Keep reading to learn why it is important for your organization. Every web developer aims to keep the communications conducted over the internet as safe as possible but despite all the good intentions, this is an involved task due to the flawed designs and sub par implementations of Transport Layer Security.

10 tips for working remotely

We’re all working together to help slow the spread of COVID-19 through new policies and guidelines such as working remotely and socially distancing ourselves from others. Working remotely can be challenging. I can offer some advice about working remotely, as I have worked both remotely and in a travel capacity for over 10 years, and I really love working that way. Here are a few things I regularly do to ensure success while still managing a work-life balance.

RiskRecon vs UpGuard Comparison

There are a lot of security ratings providers now, and choosing the right one can be overwhelming. That's why we wrote this post to make it as easy as possible to help you compare RiskRecon and UpGuard. Regardless of whether you're a CISO, Vice President of Security or an individual contributor, it's safe to say you understand how important cybersecurity risk management is.