Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

3 Ways to Improve Your Security Operations

As cybercrime continues to grow and organizations digitize, understanding cybersecurity and how to improve one’s security posture becomes paramount. Unfortunately, the firewall has dissolved and tools alone, though helpful, can’t protect environments when public sector organizations are understaffed, underfunded, and struggling to maintain compliance.

Realizing the True Power of Netskope Cloud Exchange

When I talk to customers and partners about Cloud Threat Exchange (CTE), I immediately say, “I’m not in marketing, and didn’t see the future—so I misnamed the module. I should have named it Cloud Data Exchange.” Why do I say this? Because, as Netskope and Cloud Exchange have matured, the number of use cases the module can fulfill has naturally grown beyond the initial vision. How so?

Lawmakers and Capitol Hill Staff Get Hit By a Cyber Attack on DC Health Link

DC Health Link is part of the Affordable Care Act online marketplace of health insurance plans. The service provides health care to members of Congress as well as many staff members throughout Capitol Hill. This healthcare service was recently the victim of a cyber attack and suffered a serious data breach that exposed hundreds of politicians and Capitol Hill staff members.

Weekly Cybersecurity Recap March 10

It's been a rough week for major companies and the government as well, with the week finishing off with Washington D.C. lawmakers having their health information exposed. This week's attacks make it very clear that nobody is safe from cyber gangs and hackers. Dole, Dish Network, and Acer all suffered data losses this week, as well as the Crystal Bay Casino.

I caused my company's data breach. Now what?

You’ve just sat down to start your work day and you’re going through your emails, hot cup of coffee in hand. You see an email from your company’s IT department telling you to install an update ASAP. As soon as you click the link in the email, you realize you probably should have checked with IT first.

Customer Corner: How Arkose Labs Implemented Runtime Security to Strengthen Its AWS Environment

Hear from Glen Arrowsmith, VP of IT and Security Engineering at Arkose Labs, about how the global leader in online account security and fraud detection uses Sysdig to secure and strengthen its AWS cloud environment. As its environment scaled, the Arkose Labs team needed to consolidate cloud and container security tools to save time and reduce risk.