Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

[PCI DSS Requirement 9] : Summary of Changes from Version 3.2.1 to 4.0 Explained

Are you curious about the updates in PCI DSS Requirement 9 as we transition from Version 3.2.1 to 4.0? Requirement 9 focuses on physical security, a cornerstone of safeguarding cardholder data. With PCI DSS 4.0, new best practices, enhanced clarity, and updated guidelines have been introduced to address emerging threats and challenges. Whether you're an IT professional, QSA, or just starting your PCI DSS compliance journey, this video is packed with insights to help you stay ahead.

How Are You Covering These New DORA ICT Resilience Requirements?

DORA’s public consultation period is over. If your organisation deals with the finances of people or other entities based in the EU or provides services to a firm that does, you will want to know how its rule set has changed. We’ve read through the Digital Operational Resilience Act (DORA) documentation and kept up to speed with the latest EU FSI regulation memos. The bottom line is that DORA remains a very demanding regulation with a huge scope.

PowerShell Write to File: "Out-File" and File Output Techniques

Anyone familiar with PowerShell knows that the output of PowerShell commands is displayed in the terminal by default. However, there may be situations where you would want to redirect or save output to a file. In short, redirecting or saving PowerShell output increases productivity, helps with debugging, provides useful logs, and facilitates automation, especially in complex workflows or when working with large datasets.

Smart Year-End IT Investments- A Trifecta for ROI

As the year wraps up, many IT, security, compliance, and HR teams have unspent budgets that won’t roll over. Rather than scrambling for last-minute, low-value purchases, why not make smart, strategic investments that will pay dividends in 2025 and beyond? Are you concerned about—reducing insider risk, increasing workforce productivity, and guarding against compliance fines?

Mastering Privileged Account and Session Management: 6 Best Practices to Implement in Your Organization

Cybercriminals will often target an organization’s privileged accounts, which provide a pathway to highly valuable assets. If compromised, privileged accounts and sessions can be used for malicious activity, potentially causing cybersecurity incidents. These incidents may lead to operational disruptions, financial losses, compliance issues, and reputational damage.

CrowdStrike Strengthens SMB Security with Seamless Mobile Protection

Small and medium-sized businesses (SMBs) face many of the same cybersecurity threats as large enterprises but often lack the resources to maintain robust security across all devices. As SMBs rely on a growing number of smartphones and tablets, they must defend against a range of mobile-focused cyberattacks. The need for comprehensive security has never been more urgent.

CrowdStrike and Cribl Expand Partnership with CrowdStream for Next-Gen SIEM

While SIEM solutions have existed for decades now, the market has faced recent upheaval with the advent of cloud-native solutions and a surge of mergers and acquisitions in the last year. As the SIEM market undergoes seismic shifts, CrowdStrike and Cribl have joined forces to help SOCs with their modernization journey. We’re pleased to share that CrowdStrike and Cribl are expanding our partnership to help organizations take the next step in their SIEM journey.

Retail Threat Landscape 2024

The United States, is a prime target for cyber attacks. The U.S. retail sector, which holds nearly one-third of the global market share, has seen a significant rise in ransomware incidents, accounting for 45% of global retail ransomware cases in the past three quarters—a 9% increase from 2023. New groups like Ransomhub and Hunters have emerged and supply chain threats have increased. Social engineering tactics are on the rise, with attackers impersonating IT personnel.