Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Comprehensive, Continuous, and Compliant: Obtain Proactive Insights with Splunk Asset and Risk Intelligence

The Splunk team is excited to announce the release of the latest addition to our security product portfolio, Splunk Asset and Risk Intelligence (ARI). The modern digital landscape is a complex mix of devices, users, and a wide array of products and applications, all spread across on-prem, cloud, and hybrid environments.

New NIST Zero Trust Guidance Reinforces Agent Hygiene Value

This week, the National Institute for Standards and Technology (NIST) released “Implementing a Zero Trust Architecture (NIST SP 1800-35)” for public comment. The guide is written by NIST’s National Cybersecurity Center of Excellence (NCCoE) in collaboration with 24 cybersecurity companies. Now in its fourth draft, NCCoE has opened up comments for this Zero Trust Architecture (ZTA) guide through Sept. 30, 2024, as part of a 60-day review cycle.

Dude, Where's My Documentation?

This is a public service announcement: The not-so-simple act of securing applications produces a lot of documentation, including playbooks and policies, that isn’t typically needed on a daily basis. But when a zero-day event occurs, such as the recent Crowdstrike incident, application security teams better be able to find everything they need—and fast. Sadly, in both big and small companies, missing and outdated documentation is rampant.

SecurityScorecard and ServiceNow Expand Partnership with New Capabilities for TPRM and Security Incident Response (SIR)

ServiceNow and SecurityScorecard have been longtime strategic partners, helping mutual customers measure and manage cyber risk. Today we’re highlighting the next phase of our partnership and innovation to help customers tackle the complex challenges associated with managing cyber risk in the third party ecosystem. Organizations struggle with prioritization, resource constraints, and the need to act quickly when responding to threats.

Mastering the Art of Cloud Governance: A Comprehensive Guide

In today’s fast-paced digital landscape, cloud computing has become an indispensable asset for organizations seeking agility, scalability, and cost-efficiency. However, as businesses embrace the cloud, they must also navigate the intricate challenges of managing and securing their cloud environments. This is where the concept of cloud governance comes into play, serving as a crucial framework for establishing control, ensuring compliance, and optimizing resource utilization.

DLP 101: The Best Data Loss Prevention Software for 2024

In a world where data breaches hit the headlines almost daily, organizations need effective data protection measures more than ever. Let's dive into the world of Data Loss Prevention (DLP) and discover how this powerful software can safeguard your organization's most valuable asset: your data.
Featured Post

Why Shadow IT Prevails for UK SMEs

Fuelled by hybrid working models, easy access to cloud services, and the evolution of AI, shadow IT continues to be a pressing issue for UK organisations. Today, business users demand access anywhere at any time using multiple devices, while they expect their confidentiality, integrity and availability to be preserved as if they were in the office.

Windows Downdate: Downgrade Attacks Using Windows Updates

Downgrade attacks—also known as version-rollback attacks—are a type of attack designed to revert an immune, fully up-to-date software back to an older version. They allow malicious actors to expose and exploit previously fixed/patched vulnerabilities to compromise systems and gain unauthorized access.