Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

How To Spot Phishing Emails

Phishing emails have traditionally been easy to spot by looking for signs such as misspelled words and unsolicited links and attachments. Although phishing emails are not a new occurrence, they have become a part of our daily lives. With the advancement of technology, however, the cybercriminals behind these phishing emails now have developed new ways to scam their victims. Regardless of these advancements, there are still ways to protect yourself from phishing emails.

Weekly Cybersecurity Recap September 22

This week, we noticed that data breach attackers targeted a substantial number of hospitals. north Carolina patients are being impacted the most currently. Along with health groups like Atrium and Novant Health, nonprofit Save the Children was hit by a breach, as was the TransUnion credit bureau and Caesars Entertainment. A huge number of people were impacted by this breach between these different major organizations.

Noname Security and Intel Trust Authority: Building Trust Through Confidential Computing

Intel’s Trust Authority is a new service that provides remote verification of the trustworthiness of a compute asset, based on attestation (cryptographic verification) and policy (a legitimate workload). This is a significant development for confidential computing, as it provides a way for organizations to independently verify the security of their workloads. Noname Security is excited to be a partner in the Intel Trust Authority program.

Atrium and Novant Health Get Attacked and Patients Suffer in 2023

Both Atrium Health and Novant Health are health organizations that work with a large number of hospitals offering services. These v work with data from thousands of patients and enable standard hospital practices to occur. Between the two organizations, a huge number of different hospitals and private practices are involved. That's why it's upsetting to learn that both of these organizations were recently breached.

How to Secure a REST API

Sitting at your desk, coding away with another cup of your favorite caffeine-infused beverage, you might be thinking to yourself, “it’s true what they say about no rest for the weary.” If you’re developing an app or architecting a cloud-native system, you can actually get the REST you need with the right Application Programming Interface (API). REST APIs provide a scalable, flexible, easy-to-use interface that makes developing and connecting web apps easier.

The Best And Easiest Ways To Secure The Data In Your Company

The business world has changed drastically in the last 20 years. Almost all of the important data is now online. This can be pretty useful, but it can also be dangerous. Why? Well, as the business landscape changed, so did the business espionage. Malicious people online are trying their very best to steal sensitive and confidential data and sell it on the market.

Cloudflare Email Security now works with CrowdStrike Falcon LogScale

We are excited to announce an extended partnership between CrowdStrike and Cloudflare to bring together Cloudflare Email Security and CrowdStrike Falcon® LogScale. With this integration, joint customers who have both Falcon LogScale and Cloudflare Email Security can now send detection data to be ingested and displayed within their Falcon LogScale dashboard.

How to perform effective user access reviews

In this series, you’ll hear directly from Vanta’s own Security, Enterprise Engineering, and Privacy, Risk, & Compliance Teams to learn about the teams’ approaches to keeping the Vanta organization secure. We’ll also share some guidance for teams of all sizes — whether you’re just getting started or looking to uplevel your operations.

How Can Kill Webs Change Security Thinking?

In my previous article, I proposed ways that modern network-derived evidence applies to the cyber kill chain—a concept created by Eric Hutchins, Michael Cloppert, and Rohan Amin that changed how security teams approach defending their digital assets. This article focuses on an evolved, non-linear version of the kill chain called the “kill web.”

As MGM Struggles Amid Ransomware Fallout, Data Recovery Lessons Abound - Part 2

The latest MGM Resorts ransomware attack demonstrates why cyber insurance is critical as part of a multi-layered security strategy. In our last blog, we discussed the recent Las Vegas cyber incidents and how no organization is completely safe. The original cyber incident at MGM Resorts occurred on September 10, 2023 — nearly two weeks ago now – and the company and its valued customers are still feeling its effects.