Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

6 Ways Ransomware Attackers Steal Your Data, And How IT Admins Can Stop Them

As companies invest in stronger firewalls and better IT infrastructure, brute force attacks have become harder to pull off. That’s the good news. The bad news is that hackers, in turn, have found new ways of wreaking havoc. The increasing use of ransomware as a weapon is a prime example of this. Through phishing or stolen passwords, a ransomware attack can sabotage a company’s most valuable asset, it’s content, without being detected.

Three New Ways Tripwire Enterprise Can Help Monitor Ephemeral Assets in Dynamic Cloud Environments

Moving applications and infrastructure to the cloud offers a degree of flexibility and scalability that can be a boon to almost any organization. Having continuous software and asset availability in cloud environments with elastic, as-needed infrastructure is extremely valuable. Sharing security responsibilities with a cloud service provider can even unburden security and IT teams to a degree.

Final Version of NIST SP 1800-23 Guides Identification of Threats to OT Assets

In September 2019, the National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology (NIST) announced the release of a draft practice guide entitled, “NIST Special Publication (SP) 1800-23: Energy Sector Asset Management.” The NCCoE spent the next two months collecting comments from the public to improve their guide. They then used this feedback to improve upon their initial draft. But the wait is finally over.

Curtail security exploits in applications and fortify your remote endpoints

The trend of working from home has hit the ground running, and businesses have turned to strategies and tools that will ensure a no-plummet productive environment. There are two major forks in the road when it comes to provisioning remote endpoints—users can use their own devices, or the company can hand over corporate-owned devices.

Monitor Carbon Black Defense logs with Datadog

Creating security policies for the devices connected to your network is critical to ensuring that company data is safe. This is especially true as companies adopt a bring-your-own-device model and allow more personal phones, tablets, and laptops to connect to internal services. These devices, or endpoints, introduce unique vulnerabilities that can expose sensitive data if they are not monitored.

What are Authentication Protocols in Cryptography?

Keeping information safe is an ongoing battle and authentication protocols are among our best friends in this fight. Keep reading to learn more! In today’s world, information is one of the most important and valuable assets that an organization can have. That is why keeping sensitive and private information away from prying eyes has the utmost importance. For this purpose, we often employ authentication protocols and cryptography methods.

How Are Bots Affecting Streaming Services?

Recently, it has been reported that Netflix has gained 16 million new sign-ups due to lockdown. This is no surprise with more people than ever being at home as a result of COVID-19. Streaming services are in high demand, this means increased sign-ups, and with more customers signing up, this increases the probability of account takeover attacks and fake account creation. With the current demand being so high for streaming services, we look into the main threats streaming services could face.

Protect Your Business with Digital Forensics Software

The world has been moving toward a fully connected workplace model for years, even prior to COVID-19. Now, understanding your company’s digital presence - and footprint - is more important than ever. Everything you or your employees do online could have lasting consequences for you, your employees, and your brand. Digital forensics provides you with a concrete, analytical way to investigate personnel claims and provide the necessary evidence to properly assess internal issues.