Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Elastic named a Leader in The Forrester Wave: Security Analytics Platforms, Q4 2022

Elastic Security for SIEM continues to be recognized by leading industry analyst firms It’s that time of the year… and we’re not talking about the holidays. That’s right, it’s analyst report season. Elastic continues to be recognized by leading industry analyst firms. Today, Forrester Research recognized Elastic as a Leader in The Forrester Wave™: Security Analytics Platforms, Q4 2022. Elastic had the highest score in the Wave in the strategy category.

Zoom. Enhance!: Finding Value in Macro-level ATT&CK Reporting

With cyberattacks growing in scale and complexity, it has never been more difficult to figure out where to invest your time and defensive resources. This remains the core challenge of optimizing an effective security organization. A good prioritization approach should be data-driven, and informed by real attacker activity.

Top 20 Worst HIPAA Violation Cases in History

Over the years, there have been countless cases of HIPAA (Health Insurance Portability and Accountability Act) violations, which can result in significant financial penalties. Most are directly linked not to accidental employee misconduct or malicious intent but to a lack of understanding of HIPAA standards by healthcare organizations. Most cases involve poor implementation of security controls or lack of risk assessment auditing, to save money and avoid costly auditing.

What's in your build? Building Images in OpenShift with Artifactory and JFrog CLI

Red Hat OpenShift is an enterprise Kubernetes container platform. It lets you build Docker images and use them to deploy your applications on a cloud-like environment (even if it’s not really on the cloud, rather a simulated cloud environment). Images built in OpenShift can be easily pushed into JFrog Artifactory – JFrog’s leading universal repository manager.

Log4j/Log4Shell One Year Later: Endemic Vulnerability Indeed

On December 9, 2021, Apache upended the cybersecurity industry by publishing a zero-day vulnerability (CVE-2021-44228) for its ubiquitous Log4j logging utility. Dubbed Log4Shell, the remote code execution flaw (CVSS score:10) allows an attacker to take control of a connected device and run malicious code, access sensitive data or alter its configuration. Because Logj4 is free and easy-to-use, it’s embedded (often deeply) in Java applications used by IT and OT platforms worldwide.

Defragging database security in a fragmented cloud world

Security can often be distilled down to protecting data. And with microservice-driven applications, the approach to cloud database security has evolved quite dramatically. Beyond just securing data in the cloud, it’s now also difficult to know where the data resides, where the data is flowing, and how this data should be classified.

Vanta is the #1 Leader in G2's Winter 2023 Grid Reports for Security Compliance

We are excited to share that Vanta has been named the #1 Leader in G2’s Winter 2023 Grid® Report for Security Compliance. We’ve also been recognized as the #1 Leader in G2’s Cloud Compliance category for the sixth consecutive season, and retained leadership in Vendor Management, Vendor Security and Privacy Assessment, Cloud Security, and IT Asset Management for multiple seasons. Vanta is the leader in a total of 19 G2 categories. ‍ ‍

2022 Cybersecurity Census Report Unveils Investment Urgency for UK's Education Sector

One in 10 UK educational institutions are subject to more than 250 attacks each year. Just one in five consider their organisation 'very well prepared' in the face of cyberattacks. Almost half (48%) believe they are lacking in either skills, solutions, or both, to deal with cyberattacks.
Featured Post

JUMPSEC works on a prototype lightweight anomaly detection system

Deploying machine learning models in the cyber security industry is complicated - especially with budget and technology limitations. Especially when it comes to anomaly detection, there's been much debate over privacy, balance, budget, robustness, cloud security and reliable implementation. For cyber security companies using machine learning technologies, ensuring clients' safety with trustworthy artificial intelligence (AI) must always be the primary objective.