Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Tame the CVE Beast using a Digital Twin

There are never enough hours in the day to do everything. I think we all have a to-do list that is at least twice as long as the time available to complete it. To cope, we prioritize what’s “on fire” or what has the most potential to immediately cause damage if it’s not taken care of. Often the things we “should” focus on fall to the wayside as they are outshined by what we must do immediately.

Majestic Care's Middletown Location Experienced a Serious Data Breach

Majestic Care is a nursing home company that has more than 20 locations throughout Indiana. The organization serves elderly patients all over the state and manages a great deal of medical and financial information as a result. That's why it's so upsetting to hear that one of the company's 20 locations was hit by a cyber attack that resulted in the loss of data. If you or one of your loved ones uses the Middletown location, you may have lost important data and could be at risk.

Tripwire and Fortra: Helping Secure IT and OT Environments Better than Ever

When I was younger, you could add a second processor to a computer, but it didn’t double the workload it handled. Natural inefficiencies meant that 1+1 was approximately 1.5 or maybe 1.75 times the workload. Today, multiprocessing and multithreading is so common that even the Windows calculator takes advantage of the benefits. So, when I look at the recent acquisition of Tripwire by Fortra, how do I calculate the result of 1 + 1?

OFAC and Vendor Management: What You Need to Know

Are you aware of the risks involved in doing business with parties sanctioned by the Office of Financial Assets Control (OFAC)? How does this impact your vendor management? OFAC stands for Office of Foreign Assets Control within the Treasury Department. As part of the U.S. government measure to enforce anti-money laundering/counter terrorism financing regulations, OFAC oversees economic and trade sanctions. These sanctions are against countries, individuals, or outfits engaged in disreputable actions.

What Is IoT Device Management? Definition, Key Features and Benefits

IoT Device Management (IDM) is a software platform that helps businesses manage their IoT devices, from identifying and tracking assets to automating operations. IDM features a wide range of features to help businesses manage their IoT devices. IoT device management platforms allow you to remotely control, monitor and update your entire fleet of IoT devices at scale.

The New Frontiers of Cybersecurity - Exponential Increase in Complexity

The New Frontiers of Cybersecurity is a three-part thought-leadership series investigating the big-picture problems within the cybersecurity industry. In the first post, we explored the reasons malicious actors have been able to enhance their ability to execute and profit from attacks. In the second post, we discussed how the massive increase in endpoints and systems online has dramatically increased the attack surface.

Tips for an Effective Vulnerability Assessment

So, you (or your friendly neighborhood MSP) have just finished a vulnerability scan as part of a vulnerability management program and/or in preparation for penetration testing. But one ominous question looms: What next? Sorting through hundreds of thousands of vulnerability logs can be daunting, and determining which ones are worth investigating further is even less of a trivial task.

How SD-WAN and Public Cloud have changed the dynamics when it comes to modern connectivity and infrastructure requirements

Digital and cloud transformation has unlocked new business opportunities and operational efficiencies for organisations. But migration to the cloud also means our approach to deploying applications and services has radically changed, as enterprises move away from traditional data centres. Likewise, flexible working means users have also moved away from traditional offices and branches.

TrustCloud Replaces Manual Risk Registers with Programmatic and Predictive Risk Tracking to Reduce Business Liability

New TrustRegister™ application introduces programmatic risk assessments, empowering companies to proactively surface risks and remediation plans, map to customer contracts, and understand potential business impact.