Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

February Cyber Roundup

The Dutch Police have arrested three individuals for suspected ransomware activity, which generated at least 2.5M Euro in extortion fees. The actors are believed to have attacked thousands of organizations, compromising the data of tens of millions of individuals. This is another example of successful law enforcement activity against ransomware operations. Such activity has increased over the past year, leading to the arrest of several prominent ransomware group members, such as Revil and Netwalker.

10 Database Security Best Practices You Should Know

Around 39 billion records were compromised between January and December of last year, according to Flashpoint’s 2022 A Year in Review report. While this result is quite staggering, it also sends a clear message of the need for effective database security measures. Database security measures are a bit different from network security practices. The former involves physical steps, software solutions and even educating your employees.

How Tines achieved SOC 2 compliance in record time, saving 250+ human hours

Achieving any kind of compliance can be grueling. Ensuring your organization is SOC 2 compliant is often a particularly laborious endeavor, requiring extensive resources to obtain and maintain. SOC 2 is a comprehensive cybersecurity compliance framework developed by the AICPA (American Institute of Certified Public Accountants). It helps guarantee third-party service providers handle customer data with appropriate security measures.

How Ransomware Sanctions Can Affect Cyber Insurance

With the rise of ransomware attacks on public and private sector organizations, insurance companies have been forced to pay large sums of money to cover the cost of these attacks. However, with UK legislation on ransomware sanctions that prevents them from paying ransomware, insurers will no longer be expected to pay out for these types of attacks. Connect with Your host James Rees Hello, I am James Rees, the host of the Razorwire podcast. This podcast brings you insights from leading cyber security professionals who dedicate their careers to making a hacker’s life that much more difficult.

How to Identify And Prevent ARP Poisoning or Spoofing Attacks

Address Resolution Protocol (ARP) acts as a vital bridge between the world of IP addresses and MAC addresses, allowing devices on local area networks to seek out each other's physical address based solely on their IP. ARP (Address Resolution Protocol) can also be defined as a communication protocol used to map a network layer address (such as an IP address) to a link layer address (such as a MAC address).

7 keysteps for PCI DSS 4.0 readiness assessment

PCI DSS 4.0 Transition may seem like a daunting task for most organizations. However, you can ensure the process is a hassle-free one for you by following certain important tips and guidelines. Organizations need to undergo a PCI DSS Readiness Assessment to embrace the transition from PCI DSS 3.2.1 to PCI DSS 4.0. So, for those looking to conduct this readiness assessment, here are some useful tips that can help you make this assessment and the transition a success for your organization.

CyberArk

By applying intelligent privilege controls to all identities – human and machine – CyberArk enables secure access to any resource, anywhere, everywhere – with a single Identity Security platform.