Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Dell Data Breach: Personal Information of 49 Million Customers Compromised due to latest API Abuse

Dell recently issued a notice regarding a data breach that occurred on May 9, which has reportedly affected over 49 million customers across the globe. According to a report by BleepingComputer, Dell initiated the distribution of notifications cautioning its customers that their personally identifiable information (PII) had been compromised in a data breach.

Unmasking the Challenges of Blocking Malicious IP Addresses: Overcoming the Unknown

In the ever-evolving threat landscape, identifying and blocking malicious IP addresses is an essential defense mechanism. However, this task presents unique challenges that demand careful consideration and innovative approaches. Unlike domain names, the registration details for IP addresses are less transparent, making it more challenging to access ownership information, registration dates, and the responsible parties.

Top 5 cyber security threats in healthcare

From email compromise to malware, the healthcare sector is impacted not only by familiar and persistent challenges but also with newly emerging security threats. Drawing on insights from the recent Kroll report, The State of Cyber Defense: Diagnosing Cyber Threats in Healthcare, this article outlines the key threats affecting organisations such as hospitals, health trusts, GP practices and other healthcare bodies.

Taming the many-headed monster of data privacy law

If you think data privacy law is a minefield, you’re not alone. At our last count, there were 120 jurisdictions around the globe, each with their own data privacy legislation. Each set of legislation is as complex and intricate as the next. How are you supposed to tame this multi-headed monster? How on earth did we end up here? Let’s look at the current state of global data protection legislation, where it’s headed and what you can do about it.

Introducing BDRSuite: Your Affordable Alternative to Rising Comet Backup Costs

As Comet Backup prices surge, many Managed Service Providers (MSPs) are seeking a cost-effective yet feature-rich backup and disaster recovery solution. BDRSuite by Vembu, the perfect choice for your data protection needs. Let’s explore why BDRSuite is gaining traction among MSPs.

Navigating the Future of Cybersecurity: Top I&O Challenges for the Year Ahead

The “I&O Perspectives” blog series features interviews with industry visionaries and experts with roles in product management, consulting, engineering and more. Our goal is to present different viewpoints and predictions on how organizations’ networking, infrastructure and operations (I&O) are impacted by the current threat landscape, existing networking and cybersecurity tools, as well as implications for the future of SASE.

Highlights from RSA Conference: Secure by Design, AI Insights, and Global Collaboration

RSA Conference 2024 brought together industry experts, practitioners, and policymakers to discuss the latest trends and challenges in cybersecurity. We showcased our commitment to CISA's Secure by Design, explored the potential of AI in risk management, and emphasized the significance of global collaboration. Here are some highlights from our time at RSA Conference, providing insights into the discussions and announcements that shape the future of cybersecurity.

How Cyber Risk Ratings Platforms Have Evolved - And Why Bitsight is a Leader

Bitsight was named a Leader in The Forrester Wave: Cybersecurity Risk Ratings Platforms, Q2 2024 for a third consecutive time. Click here to download The Forrester Wave: Cybersecurity Risk Ratings Platforms, Q2 2024. We are incredibly proud to be highlighted as a Leader, and our placement in this report is validation of our ongoing effort to help risk and security leaders identify exposure, prioritize investment, communicate with stakeholders, and mitigate risk.