Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Phishing May Have Preceded Data Breach Exposing Personal Information of Over 2.5 Million People

In late August, a technology provider that offers student loan account management and payment services submitted a breach notice indicating that a compromise detected on July 22 exposed 2.5 million individuals’ data, including their names, contact information, and social security numbers. At present, neither the breach notice nor subsequent reporting have provided detailed insights into the nature of the breach, noting only that it likely began in June and continued until July 22.

Choosing Secure Container Images: Secure Cloud-native Development Series

When it comes to building secure cloud-native applications, the baseline is choosing a secure container image. Docker defines a container as “a standard unit of software that packages up code and all its dependencies, so the application runs quickly and reliably from one computing environment to another.” The problem is, they’re often a pain point for many developers.

Holistic Cybersecurity for Government IT/IoT/OT Converged Networks

Government agencies rely on IoT and OT devices to carry out their missions and manage everything from security cameras and personal identity verification (PIV) card readers that monitor and control access to facilities and data, to environmental controls that improve comfort, safety and efficiency. Data centers couldn’t operate around the clock without tightly controlled air conditioning, electricity and other physical infrastructure, much of which relies on IoT.

4 tips to achieve Data Compliance

Data compliance is a crucial and essential factor in organizations that should be carefully followed for data management. Data compliance is more than maintaining relevant standards and regulations and ensuring that the data is secured. The substantial amount of data that is processed and used in organizations must be managed properly. All phases of data access, usage, modification, and storage should be governed by correct policies, protocols, and standards.

The State of Security: Poland

Poland is getting ready for the upcoming Presidential elections in August 2023 amidst a turbulent geopolitical and economic environment. The war in Ukraine has placed the country in the epicenter of the events, becoming home to more than 3.5 million refugees. The unprecedented energy crisis with prices soaring every day threaten to destabilize local economy. Besides those two important factors, cyber threats are also shaping the future of Poland.

Ingesting CrowdStrike Falcon Platform Data into Falcon Long Term Repository

Threat hunters and security teams need more data about the IT environment to add context to their investigations. To add that additional information to your Falcon environment, Falcon Data Replicator (FDR) gives you a way to pull raw event data from the CrowdStrike Falcon® platform. Now, customers can ingest, transform and analyze the data as part of their standard process.

Data Privacy in Healthcare: An Introduction to Protecting Patient Data

Healthcare organizations routinely handle large amounts of sensitive data, making data privacy in healthcare a top priority. Protecting patient data is not just about compliance—it’s crucial for maintaining patient confidentiality and safety. Unauthorized access can be severely detrimental, leading to breaches that compromise medical records and erode trust. Over the years, the digital revolution in healthcare has greatly elevated patient care standards.

8 Cybersecurity trends to be aware of in 2022/2023

The last couple of months were devastating for cybersecurity. Cyber threats intensify each waking day, and criminals seem to be getting more sophisticated and better at beating the system. For instance, the first six months of 2022 saw a whopping 40% increase in cyber-attacks from the previous year, with Ransomware being declared a state-level weapon. These attacks are causing severe disruptions to everyday lives, affecting essential services such as medical care, schools, etc.

Partnership announcement between Electric Miles and Razorthorn

We’re delighted to announce that we have teamed up with Electric Miles, B2B SaaS company providing EV charging software to charger manufacturers, offering a combined service for Electric Vehicle (EV) charger manufacturers and resellers to ensure compliance with the upcoming December 2022 cyber security regulations.

Digital Identity trends: 3 Important questions you must be asking in 2023

The constantly envisioned digital world is now here; The age of digital change for companies of all sizes and industries worldwide was sparked by the pandemic. This digital sprint has given rise to spontaneous inadequate structures for digital identity management and digital onboarding while also creating various issues to be solved in Identity Verification processes.