Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Elastic Security evolves into the first and only AI-driven security analytics solution

In our previous installation, we discussed the history of security information and event management (SIEM) solutions — from collection to organizational detections and finally to response and orchestration. Now, we are firmly in the SIEM 3.0 revolution and focused on applying generative AI to every applicable process in the security operations center with tremendous success.

What is the Connecticut Data Privacy Act (CTDPA)?

The Connecticut State Government signed the Connecticut Data Privacy Act (CTDPA) into law on May 10, 2022, and the law became effective on July 1, 2023. The CTDPA joins the ranks of other US state privacy laws, like the California Consumer Privacy Act (CCPA) and the Colorado Privacy Act, providing Connecticut consumers with robust data privacy rights and protections.

What is the Oregon Consumer Privacy Act (OCPA)?

The Oregon State Government passed Senate Bill 619, also known as the Oregon Consumer Privacy Act (OCPA), in July 2023. The OCPA will become effective on July 1, 2024, the same day the Texas Data Privacy and Security Act will also impose obligations on data controllers and processors. Oregon’s privacy legislation follows the structure of several other US data privacy laws, including the Colorado Privacy Act, the Virginia Consumer Data Protection Act, and the Montana Consumer Privacy Act.

The EU's Strategy for a Cybersecure Digital Single Market

The EU Digital Single Market Strategy (DSM Strategy) is a comprehensive initiative launched by the European Union to enhance Europe’s digital economy and maximise its growth potential across member states. The strategy includes evolving policies and specific initiatives aimed at the digitalisation of the European Union and adapting it to the rapidly changing digital ecosystem.

Aligning Cyber Strategy with Business Goals: A Crucial Gap

Explore the critical gap in many organizations where cyber strategy fails to align with business goals in this insightful episode from the Razorwire Podcast. Learn why this misalignment poses challenges for CISOs and other cybersecurity professionals who struggle to communicate the importance of security investments to decision-makers. This short delves into the often overlooked connection between a company's risk appetite and its cybersecurity measures, emphasizing the need for a cohesive strategy that supports the core business objectives.

Alarming Burnout Rates Among Cybersecurity Professionals

This episode of the Razorwire Podcast reveals startling statistics on burnout among cybersecurity professionals. Learn about the severe impact of stress in the cybersecurity field, with findings showing that 50 to 85% of professionals are experiencing burnout. The discussion also highlights a concerning forecast by Gartner, predicting that by 2025, a quarter of cybersecurity leaders will exit the profession due to overwhelming stress. Tune in to understand the depth of this issue and what it means for the future of cybersecurity.

Insights from the Experts: Legal, Compliance, and Security Perspectives on SEC Regulations

In July 2023, the U.S. Securities and Exchange Commission (SEC) announced new cybersecurity rules that require publicly traded companies in the U.S. to disclose material cybersecurity incidents within four business days of determining whether the incident is material to the company’s financial performance. SecurityScorecard recently hosted a webinar discussing the implications of the new rules and how compliance, security, and legal experts can elevate their game to meet these new regulations.

Webinar: Incorporating Digital Risk Exposure in Your Threat Detection Strategy

Watch as Kroll experts Wojcieszek and Scott Hanson outline the key benefits of incorporating surface, deep and dark web intelligence into your threat detection and response plans. During the session, they discuss the top use cases of digital risk protection and the best approaches to mapping out and reducing your digital risk across all areas of the internet. They also outline how security teams can use this external threat intelligence to improve their threat detection and response efforts and get wider visibility across the attack lifecycle.