Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Elastic SIEM is free and open for security analysts everywhere

Security teams must protect attack surfaces that are becoming bigger and more distributed due to the growth of remote work, cloud infrastructure, and other dynamics. These teams understand that meeting this challenge at scale requires the successful incorporation of the appropriate technology into their security operations program.

Use the Node.js HTTP Module to Make a Request

The ecosystem around making requests in Node.js applications is huge. With countless libraries available, it can be helpful to understand why they exist. This helps to improve your understanding of Node.js as a whole, and makes choosing an HTTP client easier. In the first post in this series, we looked at creating servers using Node's http module. In this post, we will explore making a request using the http.request method and handling the response.

Coronavirus Impact on Cyber Security

The Coronavirus (COVID-19) pandemic is increasing tremendously and disrupting the global health at large extent, in addition to the damages to economics, social and political systems. More importantly, the digital world is also on the verge of destruction because, due to this menace, the people at large scale are compelled to work remotely and doing so will make them rely heavily on remote communication and digital tools.

Should you be worried about false negative insider threats?

The consistent rise in Insider Threat-related incidents has led to a growing focus and investment in proactively detecting these threats. According to reports, 60% of organizations discovered one or more insider attacks last year, and 90% admitted that they felt vulnerable to insider attacks. Reports also show that it takes an average of over two months to contain an insider attack.

What Are SOX Compliance Requirements?

The Sarbanes-Oxley (SOX) Act was signed into law on July 30, 2002. The law drafted by congressmen Paul Sarbanes and Michael Oxley aimed to improve corporate financial governance and accountability while protecting shareholders from accounting errors and fraudulent activity. The real fuel for the SOX law came from the inappropriate financial conduct of three large companies Enron, Tyco, and WorldCom.

The future of cybersecurity for connected cars

Connected cars have slowly become mainstream, with more than 700 million of them expected to be operating on roads by 2030. Most new vehicles are leaving production lines with a host of features that require a connection to the online world, including GPS, lane assistance, collision avoidance, and modern infotainment systems. However, while connected vehicles offer abundant opportunities for the consumer, automakers need to seriously consider what they mean for consumer privacy and security.

Working from Home Security Tips for Staff and Employers

While over 70 percent of global employees work remotely at least once per week and full-time remote workers are increasingly common, there are still aren't a lot of resources that help address the cybersecurity risk introduced by remote work. In the past, workplaces that weren't set up to work remotely, simply didn't.

Who's Responsible for Industrial Cybersecurity and Securing OT Environments?

Who are the key stakeholders involved when it comes to securing OT environments? Kristen Polous, General Manager of Industrial Cybersecurity at Tripwire, discusses who should be responsible for ICS security and how these stakeholders can work together to address cyber risks.