Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Optimizing SIEM TCO: Smart Data Management Strategies

Let’s talk about a less discussed but critical aspect of Security Information and Event Management (SIEM) – data management. While the primary goals of SIEM include threat detection, regulatory compliance, and swift response, the backbone of these systems is log message ingestion and storage. The amount of machine data generated from various systems, applications, and security tools is staggering. Storing and processing this data can be costly and inefficient.

New archTIS Trusted Data Integration Solution for Structured Data

This week, during LandForces 2024 archTIS announced the launch of archTIS Trusted Data Integration, a new lightweight, fast, and agile solution for integrating, securing, and governing sensitive and classified structured data from multiple sources at scale and speed.

Tanium Podcast | Spot and prioritize threats faster with Tanium and Microsoft Copilot

“You don't need to be an expert in security response to effectively leverage powerful and complex tool.” Learn how Tanium customers get actionable responses in seconds to endpoint vulnerabilities and threats with Tanium & Microsoft Copilot for Security.

SOX Compliance in the Age of Cyber Threats

Achieving Sarbanes-Oxley (SOX) Act compliance is becoming more difficult. While the Act is primarily a financial reporting regulation, it requires all publicly traded companies operating in the United States to maintain the integrity, accuracy, and reliability of financial reporting, which those organizations can only achieve through robust cybersecurity measures. As such, an effective cybersecurity strategy is crucial for achieving SOX compliance.

Ransomware in the Global Healthcare Industry

The World Health Organisation (WHO) recently hosted a webinar to discuss the critical importance of cybersecurity in the healthcare sector, which highlighted the severity of the situation the industry is currently facing. Healthcare organisations are increasingly relying on digital systems to facilitate their daily workflow, but the prevalence of outdated legacy technology in the sector is rendering it vulnerable to cyberattacks with severe consequences.

Trustwave SpiderLabs Research: 20% of Ransomware Attacks in Financial Services Target Banking Institutions

The 2024 Trustwave Risk Radar Report: Financial Services Sector underscores the escalating threat landscape facing the industry. Deepfakes, highly realistic synthetic media, and the increasing adoption of cryptocurrencies are providing cybercriminals with new avenues to compromise financial institutions. These emerging threats are augmenting the already prevalent ransomware and phishing campaigns, creating a complex and dynamic threat environment.

How Does Spyware Get on Your Phone?

There are several ways spyware can get on your phone, such as someone installing it without your knowledge, downloading content from unreliable sources, clicking on malicious links or installing invasive apps. Spyware is a form of malware installed by a cybercriminal to spy on you and steal your personal information. Each type of spyware is designed to do something different, like watch you through your camera, display unwanted advertisements or record your keystrokes.

Do We Need Yet Another Vulnerability Scoring System? For SSVC, That's a YASS

The security world is awash in acronyms. As a niche in the security world, vulnerability, tracking, measurement, and management is no stranger to inscrutable collections of capital letters. We’ve got NVD, CPE, CWE, CVSS, EPSS, CAPEC, KEV, and of course “CVE”. The key goal of all these frameworks is to try to help folks organize information around vulnerabilities and assess how their presence might increase an organization's exposure.