Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What is an ISMS (Information Security Management System)?

An information security management system (ISMS) is a broad term that encompasses an organization’s information security policies, practices, and procedures regarding information security and how these are assessed, optimized, and implemented over time. An ISMS aims to ensure all risks are mitigated and that all risk management processes work effectively.

What is the Washington My Health My Data (MHMD) Act?

Washington’s My Health My Data Act (MHMD Act) regulates businesses and service providers that process or collect consumer health data from state residents. The act’s broad definition of “health data” carries compliance implications for a wide range of entities, including many that fall outside the scope of the Health Insurance Portability and Accountability Act (HIPAA).

Using Web Application Firewall at container-level for network-based threats

The microservices architecture provides developers and DevOps engineers significant agility that helps them move at the pace of the business. Breaking monolithic applications into smaller components accelerates development, streamlines scaling, and improves fault isolation. However, it also introduces certain security complexities since microservices frequently engage in inter-service communications, primarily through HTTP-based APIs, thus broadening the application’s attack surface.

Automating insight into SEC cybersecurity filings with Elastic

The Securities and Exchange Commission (SEC) adopted new rules last week that require companies listed on the US Stock Exchange to disclose any material cybersecurity incidents. In addition to reporting incidents, companies are also required to describe their approach to cybersecurity risk management, strategy, and governance on an annual basis.

MSU Students Could Lose Data in MOVEit Data Breaches

Michigan State University is a large school located in East Lansing, Michigan. This public university has more than 49,000 students per semester and is set over a location spread across 5,300 acres. The university caters to hundreds of thousands of students over time, many of whom may have been exposed due to a recent data breach. The breach wasn't on the university itself, but it likely impacted many of the students attending Michigan State.

Webinar: Insuring Your Digital Future - Understanding Cyber Insurance Requirements

With cyber threats becoming increasingly common, businesses of all sizes must be prepared to protect themselves from potential data breaches and other cyber attacks. Cyber insurance can be an important tool for managing these risks, but understanding the requirements of cyber insurance can be challenging. These requirements typically vary depending on the specific policy and insurer, but they often include factors such as the size and type of business, the industry in which the business operates, and the risk level associated with its IT infrastructure and data. In addition to meeting these eligibility requirements, businesses may need to comply with certain cybersecurity protocols and standards to maintain their coverage. This webinar will discuss these cyber insurance requirements and offer potential solutions for protecting your business from data breaches and other cyber threats.

ChatGPT DLP (Data Loss Prevention) - Nightfall DLP for Generative AI

**ChatGPT Data Leak Prevention (DLP) by Nightfall AI: Prevent Data Leaks and Protect Privacy** ChatGPT is a powerful AI utility that can be used for a variety of tasks, such as generating text, translating languages, and writing different kinds of creative content. However, it is important to use ChatGPT safely and securely to prevent data leaks, protect privacy, and reduce risk.

How to Restore Velero Backup Data Without Velero

Velero is the most popular tool for backing up and restoring Kubernetes cluster resources and persistent volumes. However, there may be situations where you need to restore Velero backup data without using Velero itself. For example, if Velero is not installed and configured correctly, or if more fine-grained restore control is required. In this post, we will explore how to do this when either Restic or Kopia was used by Velero to store the persistent volume (PV) data.

Forward Networks is now SOC 2 Type 1 Compliant!

It’s hard to imagine that there are upwards of 100 billion devices connected to each other today. Many of these devices are terrestrial; however, more and more devices are being brought online across the sky, sea, and space. As complexity grows, we need to ensure we have the right level of automation in place to keep everything running smoothly. One of my first goals at Forward Networks was to echo what we are already doing publicly – building a secure product in a secure environment.