Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Align Your Security Strategy with NIST Cybersecurity Framework 2.0

After a decade in the making – or waiting, as the case may be – the National Institute of Standards and Technology (NIST) has released the first major revision to its Cybersecurity Framework (CSF), a set of voluntary standards and best practices for managing cybersecurity risks. NIST CSF 2.0, released on Feb 26, 2024, expands the scope and applicability of the framework to cover more types of organizations and industries, including the private sector, government and nonprofits.

Data Subject Access Request (DSAR): The Meaning, Procedures, and Challenges

Privacy is the individual’s right to control the use of their personal data, and DSAR is the mechanism by which individuals can enforce this right. This right to their own information, as used by an organization, is guaranteed by privacy laws like Europe’s General Data Protection Regulation (GDPR) and the California Consumer Protection Act (CCPA). If your organization collects and uses personal data, especially for European or Californian customers, you should be prepared to respond to DSARs.

Detect secrets in Slack channels with GitGUardian

Good news! GitGuardian can now help you find and remediate secrets exposed in Slack channels. You already know us for accurately detecting secrets in your code base. And now, we have extended the real-time detection capability to cover the world's most popular communications platform. Add Slack to your GitGuardian monitored perimeter, and help keep secrets sprawl out of your team communications channels!

Crossing Lines: Exploring the Intersection of State-Sponsored Cyber Warfare and Corporate Espionage

Delve into the murky world where state-sponsored cyber warfare meets corporate espionage in our latest video. Join the discussion as we explore the possibility of the same groups engaging in both activities, leveraging their expertise across different clients and operations. Uncover the risks and motivations behind these clandestine maneuvers and their implications for global security. Other episodes you'll enjoy.

Iron Mountain Data Centers' Proactive Approach to Modern Threats with Rubrik

As a part of Iron Mountain Inc., a global leader in secure data and asset management trusted by 95% of the Fortune 1000, Iron Mountain Data Centers is uniquely positioned to protect, connect, and activate high-value customer data. Historically, Iron Mountain Data Centers took a defensive posture when it came to data security, focused on keeping bad actors out. Given the continually evolving nature of modern threats, the service provider had ambitious plans to elevate their cyber security platform, future-proofing their data security with Rubrik.

No Laughing Matter: Detecting LOLs with LimaCharlie

Living Off the Land (LOL) is a favorite adversarial past time. LOL’s present unique challenges as they blend easily with system “noise”, requiring careful detections that don’t drown your analysts in false positives. However, within unique challenges we can also find unique opportunities. Join us for this webinar to learn how to utilize LimaCharlie’s detection and response capabilities to identify malicious LOL activity across multiple platforms, and gain an edge against adversarial activity.

Which Cloud Provider Is Secure By Default?

Much like our own blood, data is the lifeblood that flows through the arteries of business today. Organizations must ensure that data is protected appropriately based on that data’s sensitivity, criticality, and regulatory or contractual requirements. These protections are provided through administrative, technical, and physical controls. The primary goal of these controls is to provide preventative, detective, or corrective capabilities.

How a Fortune 500 Financial Services Company Solved its MTU Issues with a Network Digital Twin

In the world of networking, misconfigurations and inconsistencies can lead to significant issues for businesses, especially those in highly regulated industries such as financial services. One Fortune 500 financial services company experienced a nightmare scenario with their MTU (Maximum Transmission Unit) settings, resulting in application and performance problems. Fortunately, the company found a solution in Forward Networks' digital twin.