Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CrowdStrike and Rubrik Join Forces to Defend Attacks on Data

With the growing volume of data and increasing cost of breaches, organizations must find ways to manage and protect their ever-expanding datasets. To address this escalating threat landscape, Rubrik and CrowdStrike have joined forces to redefine cyber defense, with several integration points between our platforms. This partnership is not about bolting on more security tools; rather, it's about gaining more leverage out of what customers already have.

Advancing Healthcare Cybersecurity: Embracing the Full Spectrum of Zero Trust

The healthcare industry, which is entrusted with people’s most sensitive data, is no stranger to cyber-attacks and breaches. This is supported by statements made on behalf of the American Hospital Association revealing that healthcare cyberattacks in 2023 affected more than 100 million people.

Unlocking Faster Drug Discovery with Streamlined Metadata

The Life Sciences industry relies heavily on navigating massive volumes of data securely and efficiently to advance drug development and fuel new innovations in Research & Development (R&D). However, decentralized data and inconsistent metadata classification can hinder scientists from locating information, verifying quality, and reproducing findings, thereby, slowing down drug development timelines.

Why We Should Probably Stop Visually Verifying Checksums

Hello there! Thanks for stopping by. Let me get straight into it and start things off with what a checksum is to be inclusive of all audiences here, from Wikipedia : “A checksum is a small-sized block of data derived from another block of digital data for the purpose of detecting errors that may have been introduced during its transmission or storage. By themselves, checksums are often used to verify data integrity but are not relied upon to verify data authenticity.”

Twilio's Prima Virani on democratizing security and tackling burnout through automation

In this episode of The Future of Security Operations podcast, I'm joined by Prima Virani. Prima is a security engineer who worked across industries as varied as oil and gas and Fintech before becoming Principal Security Engineer at Twilio. With over a decade of experience spanning infrastructure security engineering, incident detection and response, and forensics, she's also shared insights at countless security conferences around the world, including SecTOR Canada and Agile India.

"The best inspiration comes from other builders": inside the Security Automation Roadshow

Last month, we hosted our inaugural Security Automation Roadshow in San Francisco, bringing our brilliant community of builders together for knowledge sharing, interactive learning, and, of course, workflow building. Speaking at the event, our co-founder and CEO Eoin Hinchy shared the inspiration for the series. Earlier in his career, he saw how important community and peer-to-peer networking can be for both organizations and individual professional development.

Unveiling the Latest Ransomware Threats Targeting the Casino and Entertainment Industry

Anyone who has visited a casino knows these organizations go to a great deal of expense and physical effort to ensure their patrons do not cheat. Still, there is a large group of actors who are uninterested in card counting or using loaded dice at the craps table. In fact, these adversaries don't bother going into the building or even visiting the country where the casino is located. Cyber threat groups.

How To Manage SSH Keys

Secrets are non-human privileged credentials used by systems and applications to access services and IT resources containing highly sensitive information. One of the most common types of secrets organizations use is called an SSH key. Although SSH keys are secure from certain cyber attacks, they can be compromised due to secret sprawl and mismanagement.

Breaches Beyond Borders: The global landscape of third-party risk

While the digital landscape evolves, cyber adversaries are also honing their tactics, techniques, and procedures. In recent years, ransomware groups have made major disruptions to the digital supply chain and, by extension, the world economy. What’s more, organizations in all industries and geographies continue to grapple with third-party threats, zero-day vulnerabilities, and more.

The SEC Cybersecurity Disclosure Rules - Our Take

The SEC cybersecurity disclosure rules have put a spotlight on the issue of cybersecurity within organizations. The core of the rules and related guidance can be found in the article “Assess Your Readiness Now for the SEC Cybersecurity Disclosure Rules.“ The SEC cybersecurity disclosure rules should help build momentum around the importance of governance and risk management, relevant expertise, and timely incident disclosure that are fundamental to cybersecurity programs.