Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Far from fun and games: Why tabletop exercises are key to enhancing cyber resilience.

In the gaming world, one of the most popular types is the simulation category. These games are designed to closely imitate real-world activities. As the player makes decisions and analyzes current conditions the results of their choices and decisions impact what happens next in the game. These types of simulations are often used in role-play games, war games, or even business games. The whole point of such games is to teach the player something about their decisions and their environment.

Xalient Unveils MARTINA Predict 2.0: Revolutionizing AIOps with Advanced Anomaly Detection and Predictive Insights

Xalient is proud to announce the launch of MARTINA Predict 2.0, the latest iteration of its advanced AI Ops suite. This latest version introduces a pioneering cross-domain event correlation capability that not only enhances anomaly detection but also enriches the platform's predictive accuracy.

Fueling Resilience: Strengthening Physical and Cyber Defenses in Oil Refineries

Oil refineries are pivotal nodes in the global supply chain in the vast and critical energy production landscape. They process crude oil into usable products like gasoline, diesel, and various petrochemicals. Therefore, they are always in demand, regardless of the market state. According to Statista, the global oil refinery market size was $1.5 trillion in 2023.

USPS Surges to Take Top Spot as Most Impersonated Brand in Phishing Attacks

New data shows phishing attacks are deviating from the traditional focus on technology and retail sectors and are opting for alternate brands with widespread appeal. I’ve covered plenty of reports about brand impersonation and it’s almost always Microsoft on top of the list. And with good reason: access to a Microsoft 365 account can give attackers a foothold and potential access to data, applications and more.

Defense-in-Depth for Secrets Management: Discovery, Visibility, Leak Detection and AI

In the past, many security teams considered securing secrets enough – if your secrets were secured, you were good. While you’re still kind-of-good staying on this course, security professionals increasingly recognize that just securing secrets is not enough – organizations require a more sophisticated solution to help protect themselves in today’s increasingly sophisticated threat landscape.

Fines for HIPAA Non-Compliance

In today’s digital age, the exchange and storage of information has become very common in all sectors of the world, healthcare being no exception. But with this transmission and storage comes the dangers of security and unauthorized access. The Health Insurance Portability and Accountability Act (HIPAA) was enacted with stringent regulations to safeguard this data and its violations can be severe.