Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

A Guide to Controlled Unclassified Information (CUI) Markings

Defense contractors and suppliers have anxiously been awaiting news on the roll-out date for CMMC 2.0. The DoD previously indicated it would publish a final or interim final rule in 2023 to formally implement the CMMC program and contractor compliance with its requirements. There is some indication that it will now be issued as a proposed rule in May of 2023.

Chaos in the Cloud: Rampant Cloud Activity Requires Modern Protection

Digital transformation isn’t only for the good guys. Adversaries are undergoing their own digital transformation to exploit modern IT infrastructures — a trend we’re seeing play out in real time as they increasingly adapt their knowledge and tradecraft to exploit cloud environments. According to the CrowdStrike 2023 Global Threat Report, observed cloud exploitation cases grew by 95% over the previous year.

Netskope Security Service Edge: Highest in Execution, Furthest in Vision!

Today we are very pleased to share that Netskope has once again been named a Leader in the Gartner® Magic Quadrant™ for Security Service Edge (SSE). Gartner placed Netskope highest in ability to execute and furthest in vision. SSE successfully modernizes technology architecture by converging Web Proxy (SWG), ZTNA, CASB, and DLP into one, powerful, high-performing solution—effectively achieving business-level technology imperatives such as consolidation, efficiency, and optimization.

Splunk SOAR Playbooks - Dynamic Identifier Reputation Analysis (Part 1)

The Dynamic Identifier Reputation Analysis playbook is an essential tool for any security operations center (SOC) team looking for a comprehensive view of their environment’s threat landscape. By leveraging MITRE DEFEND's approach for dynamic identifier reputation analysis, SOC teams can quickly identify potential threats and vulnerabilities and take proactive steps towards mitigating risk before it causes damage.

Splunk SOAR Playbooks - Dynamic Identifier Reputation Analysis (Part 2)

The Dynamic Identifier Reputation Analysis playbook is an essential tool for any security operations center (SOC) team looking for a comprehensive view of their environment’s threat landscape. By leveraging MITRE DEFEND's approach for dynamic identifier reputation analysis, SOC teams can quickly identify potential threats and vulnerabilities and take proactive steps towards mitigating risk before it causes damage.

Mobile Money Compliance: The Importance of AML Screening in 2023

Anti-money laundering (AML) compliance in the mobile money industry has become increasingly important in 2023. With the rise of mobile money transactions, regulatory bodies are ramping up efforts to combat money laundering and terrorist financing. In this infographic, we explore the technology involved in AML screening, the importance of AML compliance in the industry, and best practices for financial institutions.

Endpoint Monitoring: The Ultimate Guide for Enterprise Security & Compliance

You keep your organization’s computers, devices and servers safe, but what about your employees’ devices? The security of their mobile phones, laptops, tablets and other devices is just as critical to your overall security posture. As company endpoints grow, so does their vulnerability. In fact, 66% of organizations are experiencing a growth in endpoint threats.

These Are The Drivers You Are Looking For: Detect and Prevent Malicious Drivers

The Windows kernel driver is an interesting space that falls between persistence and privilege escalation. The origins of a vulnerable driver being used to elevate privileges may have begun in the gaming community as a way to hack or cheat in games, but also has potential beginnings with Stuxnet.