Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

ChatGPT in Cyber Security: Need for Threat Detection and Mitigation

To develop practical solutions, it is crucial first to identify the primary threats that arise from the widespread use of ChatGPT. This article aims to analyze these emerging risks, discuss the necessary training and tools for cybersecurity professionals to respond effectively, and emphasize the importance of government oversight to prevent AI usage from undermining cybersecurity efforts. The emergence of ChatGPT brings both awe-inspiring possibilities and significant concerns regarding cybersecurity.

The Nasty MOVEit Zero-Day Vulnerability: How to Respond

The zero-day vulnerability in Progress Software's MOVEit Transfer product is being exploited by the Clop ransomware gang and other copycat cybercriminal groups to expedite the theft of sensitive data from customer databases. To protect your organization from compromise, follow the recommended response actions in this blog. Learn how UpGuard streamlines Vendor Risk Management >

Safeguarding Patients' Personal Health Information: 7 Steps to Achieving HIPAA Compliance with Trustwave DbProtect

The Health Insurance Portability and Accountability Act, best known as HIPAA, is one of the most well-known healthcare privacy laws in the United States. The primary objective of HIPAA is to safeguard patients' Personal Health Information (PHI). HIPAA's Security and Privacy rules establish guidelines for protecting Electronically Protected Health Information (EPHI), and Trustwave DbProtect is a powerful tool to help achieve this goal.

PCI DSS 4.0 Requirements - Restrict Physical Access and Log and Monitor All Access

Most data crimes are the result of online compromises. This makes sense, as the criminals don’t need to know any of the old, dirty, hands-on techniques such as lock-picking, dumpster diving, or any other evasive maneuvers to carry out a successful attack. However, this doesn’t mean that the old methods are completely defunct. Physical security is still an important facet of a complete security program.

What is the FFIEC Cybersecurity Assessment Tool?

The FFIEC Cybersecurity Assessment Tool (CAT) is a diagnostic test designed to help institutions identify risks and gauge cybersecurity preparedness. The tool is primarily for financial and non-depository institutions, enabling organizations to make risk-driven security decisions informed by regular cybersecurity assessments and standardized risk measurement criteria.

MITRE ATT&CK and How to Apply It to Your Organization

MITRE ATT&CK is a popular knowledge base that categorizes the Tactics, Techniques and Procedures (TTPs) used by adversaries in cyberattacks. Created by nonprofit organization MITRE, MITRE ATT&CK equips security professionals with valuable insights to comprehend, detect, and counter cyber threats. In this blog post, we dive into the framework, explore different use cases for using it and discuss cross-community collaboration.

Cloud Security Lounge: Vulnerability Management the SBOM Way

Vulnerability Management always starts from… a list of vulnerabilities. But where does this list come from? How do you know what software an organization is using? SBOM is a way to describe all this. It’s a data model, a format, used by a broad ecosystem helping manage vulnerabilities and more.

How Can I Use PAM to Satisfy Cyber Insurance Requirements?

Privileged Access Management (PAM) enables organizations to address core controls needed to qualify for many cyber insurance policies. It’s important for organizations to be insured and mitigate the potential impact of a breach, and PAM is a critical part of any risk management strategy. In this blog, we’ll take a look at how organizations can satisfy common cyber insurance requirements with PAM, and the security benefits doing so offers.