Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Dark Side of Desperation: How Job Losses Fuel Cybercrime

In today's tough economy, desperate individuals who've lost their jobs turn to cybercrime to make ends meet and support their families. Learn about the rise of organized cyber-based attacks and the alarming ease of accessing illegal services. Let's address the root problems and find compassionate solutions to combat cybercrime.

3 Takeaways: New SEC Cyber Risk Disclosure Rules

Yesterday the US Securities and Exchange Commission (SEC) voted 3-2 to issue long-awaited regulations that mandate uniform cyber incident disclosures for public companies. The SEC’s rulemaking progress has been lengthy and controversial, and cybersecurity experts and business advocates have been eagerly awaiting the release of the final rules after more than a year of public comment and lobbying from business and cyber experts.

Forward Networks Achieves SOC 2 Type 1 Compliance, Demonstrating Commitment to Transparency and Data Security

Forward Networks announces it has successfully achieved System and Organization Controls (SOC) 2 Type 1 Compliance. The completion of the audit demonstrates Forward Network's commitment to transparency, privacy, and data security for customers.

Protegrity and Exasol extend partnership, enabling customers to take advantage of today's rapidly evolving API economy

Integration with Protegrity's Application Protector REST API enhances Exasol's data protection capabilities and enables support for multi-cloud, on-premise and hybrid environments, providing customers with the most advanced and comprehensive data protection capabilities.

Financial Services Cybersecurity: 4 Ways to Combat Modern Threats in this Vulnerable Sector

The financial services sector is one of the highest performing in terms of cybersecurity. One factor that contributes to this performance is regulation. Laws such as FFIEC IT, the Gramm-Leach-Bliley Act, NYDFS, GDPR, and SOC2 have placed pressure on financial services companies to build and enforce some of the strongest cyber risk management programs across any industry. You should consider another factor, which is money.

Why Is PowerShell So Popular for Attackers?

There is an old saying: “One person’s tool is another person’s weapon.” That is certainly true of Windows PowerShell. Included with every Windows operating system today, this powerful command-line shell and scripting language is used by IT professionals for system administration, remote management, cybersecurity, software development and more.

Why 2023 Requires a New Approach to Dark Web Monitoring

Dark Web monitoring strategies need to evolve. Gone are the days when the Dark Web was a haven mostly only for people who wanted to post illicit content anonymously. Today, the Dark Web has expanded into a hotbed for threat actors, who use Dark Web forums and apps to distribute malware and sell the fruits of their hacking activities.