Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why Threat Hunting is Crucial to a Managed Detection and Response Service

Managed detection and response (MDR) is justifiably one of the fastest-growing areas of cybersecurity, with Gartner estimating 50 percent of organizations will be using MDR services by 2025. But in choosing an MDR service, security pros should take into consideration what kind of expertise the provider can bring to bear – and how that expertise should extend beyond the MDR service itself.

15 Key Point Vulnerability Assessment Checklist [ Free Excel File]

It is crucial to assess vulnerabilities properly to achieve your cybersecurity goals through your vulnerability management program. A vulnerability assessment checklist can be a practical solution to ensure a consistent and thorough assessment process and minimize the risk of missing significant vulnerabilities.

Zero Trust at Scale in Federal: Powered by Tanium and Microsoft

The U.S. defense industry is one of the most high-profile and frequently attacked sectors in the world. Whether it’s the fault of nation-state actors, terrorists or even financially motivated cybercriminals, the stakes couldn’t be higher — for national security and battlefield success. The war in Ukraine has revealed how kinetic and digital capabilities are increasingly linked in offensive operations. But this isn’t just a Pentagon challenge. Sophisticated attacks are also increasingly targeting critical infrastructure providers in sectors like healthcare and financial services.

Implementing Security Controls

Defense-in-depth is the best strategy for reducing cybersecurity risk. Just like how a medieval castle uses layered defenses for its physical security, modern organizations implement layered security controls to protect the confidentiality, integrity, and availability of their information. The specific security controls implemented by an organization should be informed by its own risk appetite, regulatory requirements, and operational capabilities. This article covers different kinds of security controls organizations should consider adopting to protect their information assets.

CrowdStrike Congressional Testimony: 5 Recommendations to Secure the Public Sector

“We are at a point where the stakes of defensive stagnation pose increasing risks in the face of threat actors’ innovation. This is why it’s so important to continually evolve in how we prevent, detect, and respond to cyberattacks.” This excerpt from my recent testimony to Congress underscores the greatest challenge facing public sector organizations today.

Keeper Unveils New UI for a More Intuitive Customer Experience

The Keeper Vault has an updated look with modern styling for a friendlier and more intuitive user experience. In addition, Keeper’s upgraded User Interface (UI) offers clearer distinctions between elements, as well as enhanced clarity and navigation, improving usability and accessibility.

What is the Computer-Security Incident Notification Rule?

The Computer-Security Incident Notification Rule requires US federal banking organizations and banking service providers to notify the Office of the Comptroller of the Currency (OCC) that a cybersecurity incident has occurred. The bank must ensure that the OCC receives this as soon as possible and no more than 36 hours after the incident has occurred.

What is NIST 800-161? Guide & Compliance Tips

NIST 800-161 — also identified as NIST Special Publication (SP) 800-161 — was published in April 2015 as Supply Chain Risk Management Practices for Federal Information Systems and Organizations. In May 2022, a year after President Biden’s Executive Order on Improving the Nation’s Cybersecurity, NIST produced a revised version, NIST 800-161 rev. 1 Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations.

Blue Shield of California Suffers a Data Leak Through Vendor Fortra: Over 63,000 Exposed to Breach

Blue Shield of California is one of the largest healthcare providers in the state of California. The health insurance company is nonprofit and delivers insurance to Californians all over the state. Hundreds of thousands of residents rely on the provider for their health insurance, and they trust the company with vast amounts of personal and health information.