Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Consequences of Non-Compliance in Cybersecurity: Risks and Penalties

Non-compliance in cybersecurity marks a grave oversight. It involves neglecting established security protocols, leaving organizations vulnerable to malicious actors. Read on as we examine the potential risks of non-compliance, including heightened susceptibility to cyberattacks, the specter of data breaches, and the erosion of a company's hard-earned reputation.

General Data Protection Regulation (GDPR) - The Story So Far

Do you remember where you were on 25th May 2018? Perhaps you were enjoying a Friday night drink with friends. Perhaps you were with family, relaxing after a busy week at work. I was actually having a GDPR Birthday party with friends and colleagues because 25th May 2018 was a landmark day for the world of Data Protection (yes, seriously, we had a party!). But the funny thing about the effective date of the then-new General Data Protection Regulation (GDPR) was that many saw it as a date to dread.

Caesars Entertainment Gets Hacked, Exposing Countless Gamblers

Caesars Entertainment is one of the largest casino companies in the United States and is well-known for its loyalty program. The company serves countless customers in Las Vegas and elsewhere throughout the world. The massive loyalty program takes in data from all of Caesars customers, and that program may have just backfired on the company, potentially hurting many of its customers in the process.

Random but Memorable - Episode 11.4: Resilient Leader Rock Band with Sarah Armstrong-Smith

How can security leaders be effective and resilient in one of the world's most fast-paced sectors? We're joined by Chief Security Advisor at Microsoft, Sarah Armstrong-Smith, who offers her advice on crisis management and building a human-first security culture. 🚨🧑‍💻 We also serve up our latest 1Password tips in Did You Know? Plus, an episode wouldn't be complete without a game of HackerNoHacker! 🔐💻

Shift Left: A One-of-a-Kind Developer Community in the Cybersecurity Space

To foster a culture of data protection that enhances global enterprises through secure application development, Protegrity developed the Shift Left Developer community. Our community recognizes the discrepancies and challenges data teams face when it comes to implementing solutions – both technologically and professionally – and offers the resources, guides, and cross-collaboration from teams around the world to help develop effective and efficient approaches to integration processes.

Kroll named as an Overall Leader in KuppingerCole 2023 Managed Detection & Response Leadership Compass Report

The 2023 KuppingerCole Leadership Compass Report: Managed Detection & Response Services provides an overview of the market for MDR services that manage a collection of cybersecurity technologies to provide advanced cyber threat detection and response capabilities. In the report, Kroll was identified as a leading MDR provider, alongside just seven other MDR vendors selected from the across the whole MDR market.

From one realm to another: Ensuring data protection in a cloud migration

In today's digital landscape, businesses are embracing the transformative power of cloud migration. Shifting operations from on-premises systems to cloud environments promises unprecedented benefits in scalability, cost-efficiency, and agility.

Nagios XI vulnerabilities resulting in privilege escalation (& more)

During some standard research as part of the Outpost24 Ghost Labs Vulnerability Research department, I discovered four different vulnerabilities in Nagios XI (version 5.11.1 and lower). Three of these vulnerabilities (CVE-2023-40931, CVE-2023-40933 and CVE-2023-40934) allow users, with various levels of privileges, to access database fields via SQL Injections.

Navigating the AI Maze: Demystifying Artificial Intelligence and Its Misconceptions

In the world of technology, few concepts have captured our collective imagination like Artificial Intelligence (AI). It’s the promise of machines that can think, learn, and perform tasks with a level of sophistication that mimics human intelligence. Yet, the allure of AI has also given rise to a web of confusion, myths, and misunderstandings.

Strengthening our CrowdStrike Bond with Falcon Integration

It’s been just about a year since we first announced our partnership with CrowdStrike. We are delighted to share today that we’ve further strengthened that partnership with the new “better-together” story of Salt and the CrowdStrike Falcon® platform.