Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Monitor Azure data protection services with Datadog

Azure Backup Vault, Azure Recovery Services Vault, and Azure Site Recovery make up Microsoft’s core suite of data protection and disaster recovery services. Azure’s vaults enable customers to store backups of entire Azure VMs, on-premise workloads, and workloads from Azure services such as Azure SQL Database, Azure Blob, and Azure Database for PostgreSQL. Azure Site Recovery integrates with Azure Recovery Services Vault to extend its backup services to support disaster recovery.

Sequenced Event Templates via Risk-based Alerting

Sequenced event templates are pretty cool, but they were developed around the time that Risk-based Alerting (RBA) was developed in Splunk Enterprise Security. Additionally, they don’t have all the great context we can generate with the holistic picture provided by risk, so I want to provide guidance on how we would implement its equivalent in the RBA context as they are now deprecated in Splunk Enterprise Security 8.0. There are two approaches we can utilize that do slightly different things.

NeoSystems Achieves Perfect Score for CMMC Level 2 Certification. What Does This Mean for You?

Cybersecurity threats are evolving at a record pace, creating significant gaps and challenges for organizations handling sensitive data. To strengthen security across the Defense Industrial Base (DIB), the Department of Defense (DoD) introduced the Cybersecurity Maturity Model Certification (CMMC) program.

CCNA vs. CompTIA Security+ Certification

In today’s competitive IT landscape, certifications serve as valuable credentials that validate technical expertise and enhance career prospects. Whether you’re entering the field or looking to advance, earning the right certification can set you apart from the competition and open doors to better jobs and opportunities. Among the most sought-after IT certifications are CompTIA Security+ and Cisco Certified Network Associate (CCNA).

How to build security policies that work for people-not just compliance

Strong security policies are the foundation of any successful security program. Before jumping into tools like Vanta to manage and automate your policies, it’s crucial to get the basics right—starting with how those policies are created, adopted, and aligned with compliance controls. ‍

The Trade Desk's Joe McCallister on salary negotiation and leading without micromanaging

In this week’s episode of The Future of Security Operations podcast, host Thomas Kinsella is joined by Joe McCallister. Joe’s journey in security is truly unique - in less than a decade, he pivoted from selling BMWs to his current role as Senior Manager of Cybersecurity Operations at The Trade Desk. He’s also led impactful initiatives in risk management, threat hunting, and incident response at Synoptek.

Medical Device Regulation (MDR): Why Cybersecurity And Fuzz Testing Are No Longer Optional

The MDR came into full effect in 2021, but many devices are still certified under MDD and will need to transition. As a result, Europe is facing a period of regulatory limbo. The MDR outlines what manufacturers must achieve but not how to do it, creating a gap between regulatory intent and practical implementation. To help bridge this gap, manufacturers rely on.