Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Simply AD group management

Managing AD group membership using native tools can quickly become overwhelming. However, most cybersceurity insurance policies and compliance standards also mandate a regular review and recertification of group memberships to avoid huge penalties. Eric Hibar, One Identity solutions engineer, explains the best path forward to solve your group management headaches.

#190 - How MSSPs can help clients meet regulatory requirements with Garret Grajek, CEO at YouAttest

On this episode of The Cybersecurity Defenders Podcast we speak with Garret Grajek, CEO of YouAttest, about how MSSPs help clients meet regulatory requirements and what it means for the MSSP.

How the Proposed HISAA Law Could Reshape Cybersecurity Compliance

It’s been a tough year for the healthcare sector. Throughout 2024, cybercriminals have unleashed a barrage of attacks on a vast number of healthcare organizations - with disconcerting levels of success. FBI research revealed that healthcare is now the US’s most targeted industry.

Threat Context monthly: Executive intelligence briefing for January 2025

Welcome to the Threat Context Monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news and threat information from KrakenLabs, Outpost24’s cyber threat intelligence team. Here’s what you need to know from January.

Kubernetes Network Security at Scale: Troubleshooting, Visibility & Compliance with Calico

Kubernetes adoption continues to grow as enterprises increasingly rely on containerized environments to deploy and scale their application. However, the complexity of the Kubernetes environment has evolved dramatically. It ranges from single-cluster setups of workloads to multi-cluster environments spanning hybrid and multi-cloud infrastructure. Kubernetes deployments are now characterized by their scale and diversity.

February 03 2025 Cyber Threat Intelligence Briefing

This week’s briefing covers: KTA080 (CL0P) Update Around January 28, 2025, KTA080 (CL0P) updated its data leak site with a new victim list of approximately 49 organizations. The organizations are likely from the previous redacted list that was reported on listings and are possibly associated with the Cleo zero-day vulnerability, but cannot be confirmed since the group does not indicate it in their post.

What's new in Riscosity: January 2025

Riscosity’s premier capability to automatically act upon any data type that organizations’ products are sharing with 3rd party vendors has been enhanced even further to support SFTP traffic. Now, any data type going over SFTP to any 3rd party vendor can be automatically blocked, redacted, or notified about.

The Future of Cloud Computing: What's Next for Businesses and Technology?

The future of cloud computing is expected to drive innovation, efficiency, and security in the future, transforming both organizations and technology. Faster processing, improved security, and more intelligent automation are becoming more and more necessary as businesses depend more and more on cloud infrastructure.