Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Why the disaster recovery strategy my company has always used may not be enough.

Is my organization’s disaster recovery strategy ready for today’s uncertain cyber landscape? Your company has determined the recovery point objectives (RPOs) and recovery time objectives (RTOs) for all systems. You have also implemented solutions to achieve these goals. Your organization routinely performs successful Disaster Recovery (DR) tests meeting your established expectations and objectives.

How To Ensure Data Integrity

You can ensure data integrity in your organization by enabling data encryption, investing in a password manager, regularly backing up your data and implementing strict access controls. Data integrity ensures that your data is accurate and complete, meaning it hasn’t been changed, removed or stolen by an unauthorized user. Continue reading to learn why data integrity is important and how your organization can ensure your data is accurate, complete and consistent.

Facebook Marketplace Scams To Avoid in 2024

In 2024, you should avoid several Facebook Marketplace scams, including those related to mobile payments, gift cards, stolen items and rental properties. Facebook Marketplace is part of Facebook and it allows you to buy or sell items from local individuals or small businesses. Since some Facebook Marketplace transactions occur online, there are various ways you could fall victim to these types of scams.

Critical Vulnerabilities Uncovered: How Bitsight Delivered Fast, Actionable Insights in Under 24 Hours

The speed at which vulnerabilities are detected and addressed can drastically impact an organization’s likelihood of suffering a security incident. Recently, Bitsight demonstrated how its investments in product fingerprinting and CVE mapping allowed it to identify and surface assets potentially impacted by a set of critical vulnerabilities in the CUPS printing system in under 24 hours.

This Month in Datadog: New Cloud SIEM Content Packs, Anthropic integration, Metrics Volume, and more

Datadog is constantly elevating the approach to cloud monitoring and security. This Month in Datadog updates you on our newest product features, announcements, resources, and events. This month, we put the Spotlight on new Cloud SIEM Content Packs..

Faster threat detection, stronger security: The Kibana advantage

In the world of security, every second counts. A shorter mean time to detect (MTTD) translates to less damage, increased customer trust, and a greater likelihood of securing cybersecurity support. An important factor in achieving this rapid response is the power of an intuitive and user-friendly interface.

Is IAM, SIEM, and DLP Enough to Combat Insider Risk?

Despite significant investments in cybersecurity tools like Identity and Access Management (IAM), Security Information and Event Management (SIEM), and Data Loss Prevention (DLP), insider risks continue to grow. Why? These tools primarily focus on actions, logs, and event recognition rather than taking a deep, sophisticated approach to understanding human behavior over time. Insider threats—whether from negligence, malicious intent, or compromised users—are notoriously difficult to detect.

10 Essential Guidelines For Enterprise-Ready AI Solutions

AI-powered solutions are becoming increasingly prevalent in enterprise environments, leading to a new trend in procurement: the need for comprehensive AI governance frameworks. This shift reflects a growing awareness of AI-specific risks and the need for more granular controls. As the founder of Nightfall AI, a startup building AI models for data security, I've navigated hundreds of procurement cycles and observed a rise in AI-specific requirements.

Critical Linux CUPS Flaws Could Lead to Remote Command Execution

CUPS is a suite of programs and daemons that provide local and network printing capabilities on Unix-like systems such as Linux and macOS. Versions before and including 2.0.1 are vulnerable to CVE-2024-47076 (libcupsfilters), CVE-2024-47175 (libppd), CVE-2024-47176 (cups-browsed) and CVE-2024-47177 (cups-filters), all of which can be chained together to allow remote unauthenticated code execution. At this time there is no updated version available.