Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Top 7 Database Security Best Practices

Safeguarding your data is not just an option—it’s a necessity. Cyber threats are evolving at an unprecedented pace, and your database could be the next target. Whether you’re managing sensitive customer information or intricate analytics, database security should be at the top of your priority list. This article dives deep into the top 7 database security best practices that will help you fortify your defenses.

Rakuten Drive: Secure, but Private File Transfer and Cloud Storage?

Are you looking to try a new service to transfer large files of up to 50GB? Then there’s a new player in the file-sharing market that may interest you — Rakuten Drive. In February 2024, Rakuten announced the commercial launch of Rakuten Drive, a file storage cloud service based in Japan. Rakuten Drive allows individuals and enterprises to send large files with customized access controls, store, and edit Microsoft documents.

AI Threat Scenario, GuLoader, DarkGate, MirrorBlast, Kutaki Stealer and More - Hacker's Playbook Threat Coverage Round-up: May 2024

In this version of the Hacker’s Playbook Threat Coverage round-up, we are highlighting attack coverage for newly discovered or analyzed threats, including a newly created scenario that leverages AI Generated malware. SafeBreach customers can select and run these attacks and more from the SafeBreach Hacker’s Playbook to ensure coverage against these advanced threats. Additional details about the threats and our coverage can be seen below.

CVE-2024-24919 - Check Point Quantum Gateway

CVE-2024-24919 is a critical security vulnerability identified in Check Point Quantum Security Gateway, a widely used network security appliance. This vulnerability allows attackers to exploit the gateway, leading to the exposure of sensitive information. As a zero-day exploit, it presents significant risks to organizations relying on Check Point for their network security.

New CIP standards: Why utilities shouldn't wait to deploy

On May 9, the North American Electric Reliability Corporation (NERC) officially adopted new Critical Infrastructure Protection (CIP) requirements for Internal Network Security Monitoring (INSM). This is one of the last steps before Federal regulators make it an official standard for utilities and the electrical power grid industry. What does it mean? Compliance for CIP-015-1 is coming to your utility. Utilities will need monitoring tools with deep and wide asset intelligence and network control.

Revolutionizing Security: Brivo's Unified Platform for Enhanced Collaboration

Dive into the world of advanced security with Brivo's groundbreaking collaborative framework. In this video, we explore how Brivo is changing the game by fostering open collaboration among providers to create an integrated security environment. Discover how this approach allows customers to control and respond to events from a single platform, making security management more efficient and effective than ever before.

Learn Strategies for Global Compliance | GDPR compliance | India's Data Privacy Act

Listen to Kaushik Saha, Group CISO at RP-Sanjiv Goenka Group, as he explores India's changing data protection rules. In this video, he explains what companies need to know if they already comply with global standards like GDPR, PDPA, HIPAA, and CCPA. Highlights of the video: One of the key points Kaushik emphasizes is the significant escalation in penalties under India's data protection regulations. This development underscores the urgent need for companies to implement robust consent management mechanisms against data breaches.