Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

July 2023

How Trustwave Uses Workforce Skills Frameworks to Assemble Effective Cybersecurity Teams

Building and maintaining a strong, diverse, and technically effective cybersecurity workforce can prove difficult, but one method of simplifying this task is using a cybersecurity workforce skills framework to review the composition of an organization's current cybersecurity function.

3 Key Metrics to Include in Your Cybersecurity Risk Analysis

Every organization faces cyber risk. But that risk can vary by industry, business size, the regulatory environment, supply chain, and more. Understanding your security risk posture is essential for targeting your security budget and effective resource allocation. Conducting a risk assessment can assist you in this endeavor, but to gain optimal insights, you should also include a comprehensive cybersecurity risk analysis as part of this process.

PCI DSS Compliance in Healthcare

Data security has become an essential aspect of our lives and is more crucial than ever before. In the healthcare industry, organizations are entrusted with a plethora of sensitive information, including PHI, PII, and financial data. This renders them accountable for complying with both HIPAA and PCI regulations. Adherence to these regulations is paramount for safeguarding sensitive patient information from data breaches and cyber attacks.

Customers and Employees of Talcott Resolution Life Insurance Likely Lost Data to Recent Breach

Talcott Resolution Life Insurance is a newer company founded in 2018. The organization specializes in life insurance and annuity offerings. It's located in Windsor, Connecticut, and has an annual revenue of $1.6 billion. The organization is responsible for managing about one million insurance contracts currently, which is a serious concern since the company was recently breached. This data breach could lead to substantial customer losses if those involved don't react quickly enough.

Phishing Trends and Tactics: Q1 of 2023

In the world of cybersecurity, there are a few constants, one of the big ones being the fact that news, innovation, and threats move fast and are constantly evolving. It is important for security professionals to stay in the loop about major developments in cybercriminal activity and the cybersecurity industry. Fortra’s PhishLabs offer resources to learn about a variety of cybersecurity-related topics, including a blog that regularly features cybersecurity news.

PCI DSS 4.0 Requirements -Test Security Regularly and Support Information Security with Organizational Policies and Programs

The Payment Card Industry Data Security Standard (PCI DSS) has always been a massive security undertaking for any organization that has worked to fully implement its recommendations. One interesting aspect that seems to be overlooked is the focus on the Requirements, and while minimizing the testing necessities. Not only is testing part of the full title of the Standard, but it is formally memorialized in Requirement 11 of the Standard, “Test Security of Systems and Networks Regularly.”

What is the difference between incident response & threat hunting?

When it comes to protecting data in an evolving threat landscape, two common strategies are at the forefront: incident response and threat hunting. While both processes can safeguard an organization's data, their approaches, objectives, and execution differ significantly. Understanding the differences between the two strategies is critical for organizations aiming to.

Navigating the Cyber Insurance landscape as a Gen Z digital citizen

In the modern world, cybersecurity and cyber insurance go hand in hand. As we head into the future and the presence of AI in every part of your life grows, so will the responsibilities that need to be taken to ensure security and peace of mind regarding your data and personally identifiable information. As the relatively new cyber insurance industry gets on its feet, it will become more accessible to everyday life, and that trend is already emerging.

How To Secure Your Gmail Email Service Account

Gmail accounts often contain vital, sensitive information including confidential documents and personal photos. They also often serve as a way to recover passwords for accounts like your banking login. That’s why email accounts are a common target for cybercriminals. Access to your Gmail account could be used to steal your money or your identity.

KnowBe4 Named a Leader in the Summer 2023 G2 Grid Report for Security Orchestration, Automation, and Response (SOAR)

We are excited to announce that KnowBe4 has been named a leader in the Summer 2023 G2 Grid Report for Security Orchestration, Automation, and Response (SOAR) for the PhishER platform for the ninth consecutive quarter! The latest G2 Grid Report compares Security Orchestration, Automation, and Response (SOAR) Software vendors based on user reviews, customer satisfaction, popularity and market presence. Based on 202 G2 customer reviews, KnowBe4’s PhishER platform is the top ranked SOAR software.