Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Tanium ITX for ServiceNow

Unite IT Service Management, IT Asset Management, and IT Operations Management with real-time asset visibility and actionability through a complete, accurate, and up-to-date view of their enterprise hardware, software, and virtual asset inventory and usage in the ServiceNow CMDB. Enable self-service software deployments, usage-based revocation, incident remediation, and planned patch operations.

Tanium Security Operations for ServiceNow

Proactively identify endpoint vulnerabilities and compliance risk, automate patching to close security gaps, enrich security incidents with real-time intelligence, and identify unauthorized changes and configurations. Tanium Security Operations for ServiceNow facilitates IT, security, and risk teams to identify, prioritize, remediate, and proactively eliminate critical gaps at scale.

Atlas Oil: The Consequences of a Ransomware Attack

Atlas Oil, a major player in the oil and fuel distribution industry, fell victim to a ransomware attack orchestrated by the Black Basta group. This attack not only compromised sensitive company data but also exposed a variety of documents that could potentially harm the company’s operations and reputation. Overall, Black Basta claims to have exfiltrated approximately 730 GB of data.

The Role of Supply Chain Cyber Risk in U.S. Healthcare: Inside SecurityScorecard's new report

In late February of this year, Change Healthcare experienced a massive ransomware attack. The company, a subsidiary of United Healthcare, is the largest clearinghouse for insurance billing and payments in the U.S, processing 15 billion medical claims each year.

What You Need to Know about the Norton LifeLock Data Breach

Norton LifeLock is a global player in consumer cyber safety with a growing portfolio designed to ensure users are confident in their online privacy, security, and identity theft protection. In January 2023, the company announced that many customer accounts were affected in a breach.

Why the DORA Regulation Matters Beyond the EU

The Digital Operational Resilience Act (DORA) is a robust cybersecurity regulation in the European Union (EU) taking effect next year. It is designed to help protect against evolving digital threats to financial systems. Like GDPR, the scope of DORA isn’t only limited to financial services companies and banks. Service providers in Information, Communications and Technology (ICT) and third-party vendors are also on the hook. If you haven’t been preparing, the time to be is now.

Enhancing Cyberhaven Data Loss Prevention with Exact Data Match

We're excited to announce the introduction of Exact Data Match (EDM) to Cyberhaven’s suite of Data Loss Prevention (DLP) capabilities. Although EDM technology has been in use since the 2000s, Cyberhaven is adapting and advancing this technology to meet the demands of today’s data security challenges. Read on to learn more!