Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Protecting DOD controlled unclassified information (CUI) from getting into the wrong hands

archTIS Director of Federal and Defense, Bill Kalogeros recently presented a CMMC 2.0 Workshop with FCW on new controlled unclassified information or ‘CUI’ marking requirements for CMMC 2.0 which is expected to go into effect in May of 2023. Here’s a summary of his session and a link to the recording to learn more about the pending changes to CUI handling and how to prepare.

Money Laundering in the Metaverse: NFTs, DeFi

According to a recent analysis, 17 million Ethereum transactions between Q4 2017 and Q1 2022 were associated with both criminal and licit operations. The overall cyber money laundering activities increased by 30% in 2021 compared to 2020, with hackers laundering a total of US$8.6 billion in cryptocurrencies.

How to Boost Cybersecurity in Fintech and Banking?

Globally, fintech firms saw 2.5 times more attacks in Q1 2022. The BFSI industry is prone to cyberattacks every day. Fintech firms carry some vital data. Cybercriminals know it. They aim to exploit your system’s flaw to access the data. The worst part is they will use it for financial fraud. A successful data breach causes penalties and reputation losses. It scares away your customers. It is even motivating cybersecurity in Fintech. How do you make a secure financial platform?

Why Building a Modern AppSec Program is Vital for Digital Business

This is the first of a six-part blog series that highlights findings from a new Mend white paper, Five Principles of Modern Application Security Programs. Be sure to look out for our upcoming blogs on each of the five principles. The COVID-19 pandemic accelerated the digitalization plans for global organizations by three years, while the adoption rate for digitized products and services increased by seven years.

How to Configure Internet Explorer Settings and Open IE11 inside Edge through Group Policy

In this video, we explore a useful feature of Netwrix PolicyPak — the ability to configure Internet Explorer settings to dynamically set Internet Explorer Enterprise and Document modes. We also explain how to open an Internet Explorer tab inside Microsoft Edge.

Configure Group Policy Settings to Deploy Real GP using SCCM or Other Management Systems

Do you have endpoints that you'd love to manage using real Group Policy, but want to deploy the settings using something else? This video explains how to deliver Group Policy settings with Netwrix PolicyPak, including how to deploy templates, preferences and security settings to your endpoints using SCCM, KACE, Altiris or another desktop management system.

Web Application Security: What to Consider for 2023

Security is the biggest threat facing organizations that strive for faster software delivery. Organizations are witnessing increasing attacks due to application code gaps and security weaknesses. According to a Forrester report, software security flaws accounted for cyberattacks in about 47% of organizations.

PCI DSS v4.0

2022 is the year that much of the world managed, to varying degrees of success, to get back to normal. People ramped up traveling, returned to in-person activities and many returned to the office. The pandemic changed most aspects of day-to-day life, but hackers and other bad actors generally continued making life difficult for businesses, governments, and non-profit entities.

Good Password Hygiene Mitigates Personal and Business Cyber Risk

In our previous Cyber Security Awareness Month (CSAM) blog we talked about the added value we as cybersecurity practitioners can bring to the table by sharing knowledge we take for granted with individuals across the organization that will ultimately help strengthen defenses. The first topic we covered was multi-factor authentication (MFA). CSAM’s next topic is using strong passwords. Here are a few tips we have found useful to share with colleagues, as well as family and friends.