Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Get your head in the clouds

Today’s forecast is cloudy, with a chance of headaches, heartburn, and a hell of a lot of unforeseen security challenges. Digital transformation may not be a new term, but it is, nonetheless, still very much a part of the roadmap for many companies. No matter if a company is cloud-native or newly embracing the cloud, the issues of securing your cloud infrastructure can be daunting, from managing misconfigurations to monitoring hundreds of microservices. Managing your cloud attack surface can leave you feeling like Sisyphus. But if you’re feeling a little bolder (see what we did there?), you can take a deeper dive into how you can get your head in the cloud and in the cloud cybersecurity game.

Achieve Complete Hybrid Cloud Cyber Resilience with Rubrik Cloud Vault

Rubrik and Microsoft have joined forces to help you build a cyber-resilient business. Reduce the risk of a backup data breach, loss, or theft by storing immutable copies of your data in a Rubrik-hosted cloud environment, isolated from your core workloads. Keywords: cybersecurity, data security, ransomware, malware, cyber resilience, zero trust, azure, Microsoft, Rubrik, disaster recovery, data protection, hybrid cloud.

Voice of the SOC 2023

Security teams are getting restless. Before founding Tines, I spent 15 years in the SOC leading teams charged with protecting organizations from ever-evolving threats. Over that time, the challenge facing SOC analysts became harder, not easier: workloads are increasing, but teams aren’t growing alongside them. SOC analysts are burning out as a result of tedious and repetitive tasks.

Passkey vs Password: What's the Difference?

There are several ways in which passkeys are different from passwords in terms of how they are created, how they are filled into websites and how they are secured. Passwords are user-generated whereas passkeys are automatically generated using public key cryptography. Unlike passwords, passkeys are a new type of digital credential that is phishing-resistant and can’t be easily compromised. However, only a few websites currently support passkeys.

Secure Password and File Sharing for Federal and State Courts

U.S. court employees need to access dozens of systems and applications in order to complete their duties. These employees may also have access to Personally Identifiable Information (PII), which must be securely stored and managed with strict access controls. Court systems need a way for employees to easily and securely access systems, and share passwords and files among teams.

Navigating the Unknown: Zero-Days in the Supply Chain

Zero-days are out there. Lurking just under the surface, waiting for the right moment to strike. A security team can do everything right and still experience a zero-day attack in its supply chain. And with innumerable configurations, devices, and platforms that can be exploited, zero-day exploits are becoming more common than ever.

Mastering Cybersecurity in Today's World

In a world where AI is everywhere, cybersecurity regulations are on the rise, and cyber insurance is booming, we need standardized metrics for cybersecurity. Remember, you can’t manage what you can’t measure. A recent report by SecurityScorecard and the Cyentia Institute discovered a startling fact: 98% of organizations have a third party with a breach in the last two years. In cybersecurity, metrics matter; knowing how to communicate and report on metrics is essential.