Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

Assess Your Readiness Now for the SEC Cybersecurity Disclosure Rules

The SEC’s new ‘Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure’ rule (issued on July 26, 2023) has public companies, notably smaller companies, worrying about having enough cybersecurity expertise to run a security program consistent with SEC requirements.

The Cyber Sleuth's Handbook: Digital Forensics and Incident Response (DFIR) Essentials

In the intricate landscape of cybersecurity, Digital Forensics and Incident Response (DFIR) stand as the sentinels guarding against the onslaught of digital threats. It involves a multifaceted approach to identifying, mitigating, and recovering from cybersecurity incidents. In the physical world, the aftermath of a crime scene always yields vital clues that can unravel the mystery behind a perpetrator's actions.

AI Assistants: A New Challenge for CISOs

Over the past year, AI innovation has swept through the workplace. Across industries and all team functions, we are seeing employees using AI assistants to streamline various tasks, including taking minutes, writing emails, developing code, crafting marketing strategies and even helping with managing company finances.

Meeting Compliance Regulations with SIEM and Logging

SIEM and log management provide security to your organization; these tools allow your security analysts to track events such as potential and successful breaches of your system and react accordingly. Usually, it doesn’t matter how you ensure your organizational safety as long as you do. However, is your organization in the health, financial, or educational industry?

CrowdStrike and Rubrik Join Forces to Defend Attacks on Data

With the growing volume of data and increasing cost of breaches, organizations must find ways to manage and protect their ever-expanding datasets. To address this escalating threat landscape, Rubrik and CrowdStrike have joined forces to redefine cyber defense, with several integration points between our platforms. This partnership is not about bolting on more security tools; rather, it's about gaining more leverage out of what customers already have.

Advancing Healthcare Cybersecurity: Embracing the Full Spectrum of Zero Trust

The healthcare industry, which is entrusted with people’s most sensitive data, is no stranger to cyber-attacks and breaches. This is supported by statements made on behalf of the American Hospital Association revealing that healthcare cyberattacks in 2023 affected more than 100 million people.

Unlocking Faster Drug Discovery with Streamlined Metadata

The Life Sciences industry relies heavily on navigating massive volumes of data securely and efficiently to advance drug development and fuel new innovations in Research & Development (R&D). However, decentralized data and inconsistent metadata classification can hinder scientists from locating information, verifying quality, and reproducing findings, thereby, slowing down drug development timelines.

What is the Dirty COW exploit, and how to prevent it

Dirty COW, a seemingly light-hearted name, masks a severe Linux privilege escalation issue. This bug has affected many older Linux systems, which is concerning given that 41% of web servers run on Linux. Despite widespread patches in distributions like Ubuntu and Red Hat, Dirty COW remains a threat, particularly to outdated systems. As a significant security flaw, it poses risks to various devices and servers even in 2024.

Security Compliance Best Practices

In view of the constantly emerging threats, more and more companies are understanding that they need to level up their responses to risks and adopt more strategic compliance operations, leaving checkbox compliance behind. According to the 2024 IT Risk and Comliance Benchmark Report, the number of companies that have started paying more attention to security risks and tied them to compliance activities has risen by 80%.