Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Did the Cash App Data Breach Happen?

The CashApp data breach was caused by a former employee who accessed customer financial reports as an act of revenge against the company after their employment was terminated. According to the April 2, 2022 filing with the Securities Exchange Commission by Block (CashApp’s parent company), the employee required access to the financial reports as part of their daily duties.

How to Become HIPAA Compliant in 2022 (Includes Checklist)

HIPAA compliance is regulated by the Department of Health and Human Services (HHS) and enforced by the Office for Civil Rights (OCR). In 2013, the final Omnibus rule was enacted, binding business associates - or third-party vendors - to the Health Insurance Portability and Accountability Act. This modification added another level of compliance complexity to an industry not accustomed to operating in the cybersecurity domain - the healthcare industry.

5 Tips for Linux Server Hardening

Linux servers have been in use for specific uses for a long time. One ought to be conscious that a new Linux server’s degree of protection is exceptionally low by default configuration. This is in order to permit as much functionality and competency as feasible while installing it. Consequently, it’s essential to carry out fundamental hardening procedures prior to installing the server in a production environment.

Active Directory Security

At its core, Active Directory domain services (AD DS) is a structured data store of objects in the domain controller. It is a directory service from Microsoft for identity management and access control in Windows domain networks. Active Directory can authenticate users, groups, services and computers to protected information. In addition to that, AD DS also helps to implement security policies and permissions. AD DS enforces them for all computers in your network.

9 Steps to Mitigate Ransomware Attacks for Your Business

Ransomware attacks have become so prevalent in recent years that it’s no longer a matter of “if” your business may be the victim of a ransomware attack, but “when.” In fact, in 2021, 37% of global organizations reported that they were the victim of a ransomware attack. To mitigate the impact and probability of ransomware on your business, you must continuously look for new ways to secure your network and maintain continuous cybersecurity monitoring.

Learn How The Arctic Wolf Security Journey Ends Your Cyber Risk

What is a security journey and how does your organization begin one? The answer lies in partnership. The Arctic Wolf security journey is custom designed to help your organization end cyber risk. By looking at the specifics of your organization and your security and business goals, we operate as a partner to implement strategic actions that minimize your risk and improve your overall security posture. With our VP of Product Marketing, Matt Trushinski, learn how our security journey strategies help your organization end cyber risk.

How Arctic Wolf Disrupts Business Email Compromise Attacks

Despite not getting the same amount of headlines as ransomware and other kinds of cyber attacks, business email compromise (BEC) costs organizations much more than ransomware and causes more damage. With our Regional VP of Sales Engineering, Brandon Tschida, learn how a BEC attack works and how Arctic Wolf can help your organization stop this kind of cyber attack before it even begins.

Incident Response Can Stop Attacks and Reduce Cyber Risk

Unfortunately, cyber incidents are inevitable. But we can reduce the likelihood of cyber risk and reduce incident damage. Join our VP of Product Marketing, Matt Trushinski as he explains how Arctic Wolf’s Managed Detection and Response helps organization recognize potential threats and remediate and recover after an incident. Incident readiness is the best defense against cyber attacks, and Arctic Wolf always has your back.

Announcing Zenity's SOC 2 Type II Certification

Security of our platform and customer data has always been a core focus at Zenity and a north star that we continue to follow, and today we’re excited to announce that we are now SOC 2 Type II certified. This certification demonstrates Zenity’s commitment to ensuring the security of our systems and the data of our customers and partners.

Spotlight on the Log-Structured Merge (LSM) Tree: One of the Keys Enabling CrowdStrike to Process Trillions of Events per Day

In a previous post, our team shared our Three Best Practices for Building a High-Performance Graph Database. That was written two years ago, when CrowdStrike Threat Graph® was processing billions of events per day and storing a few petabytes of data. Fast forward to today: CrowdStrike Threat Graph now stores over 40 petabytes of data and handles trillions of events per day while routinely serving upward of 70 million requests per second.