Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Principles for Fair & Accurate Security Ratings: A Focus on Confidentiality

SecurityScorecard is actively engaged to ensure our Security ratings align with the Principles for Fair & Accurate Security Ratings, published by the US Chamber of Commerce. As part of this effort we strive to educate the cybersecurity community on how our products align with these important principles. This article is a continuation of a series of articles that describe how SecurityScorecard meets specific security rating principles as recommended by the US Chamber of Commerce.

Lessons from the Field, Part III: Why Backups Alone Won't Save You

It’s been a while since I’ve put some thoughts together for the CISO Blog, and with World Backup Day coming at the end of this month, the timing felt right. I’ve mentioned in the past that backups are crucial to keeping your data preserved and safe. But a backup is only as good as your ability to recover it—and that depends on security, testing, and a solid response plan.

Meet FireCloud Internet Access: The Future of Secure Remote Connectivity

With hybrid and remote work now the norm, organizations face an urgent challenge – how to provide employees with seamless, secure access to critical applications without the performance and security drawbacks of traditional VPNs. At WatchGuard, we recognize that businesses need a modern, scalable security solution that meets the demands of a distributed workforce.

MDM vs Device Trust: Balancing security with productivity

Security tools inherently introduce some friction into workflows. However, too much friction can impede employee productivity to such a degree that the broader organization suffers. Historically, this has created a dilemma for CISOs, who struggle with finding the right balance between security and productivity.

Is Your Organization's Cloud Environment as Secure as You Think? Trustwave Can Help

Organizations today face a growing volume of data and alerts while dealing with tight budgets and vulnerable legacy systems. Which is why they need the security partners with the right tools that can help them make the correct security choice for their environment, and this is where Trustwave Microsoft Security Threat Protection and Sentinel Engagements (also referred to as Modern Work and Modern SecOps) come into play.

NIST Cybersecurity Framework (CSF) 2.0: A Complete Guide

The NIST Cybersecurity Framework (CSF) 2.0 is a voluntary framework developed by the National Institute of Standards and Technology (NIST) to help organizations manage and reduce cybersecurity risks. Initially released in 2014, CSF was primarily intended for critical infrastructure sectors. However, CSF 2.0 (2024) expands its scope to include organizations of all sizes and sectors, including small businesses, nonprofits, and large corporations.

HIPAA compliance for software development: A 7-step checklist

Any app collecting, processing, or storing protected health information (PHI) must be HIPAA-compliant to ensure ongoing operation without regulatory setbacks. This means that if your organization operates in the health tech industry, it must adhere to the requirements mandated by the regulation. ‍ Due to HIPAA’s broad scope and interpretative nature, the requirements may seem challenging without a clear compliance roadmap, leading to inefficient workflows and incomplete adherence to the rules.

The Akira ransomware exploit: Detecting IoT-based threats with Sumo Logic

In a recent and sophisticated cyberattack, the Akira ransomware group leveraged an unsecured Linux-based webcam to infiltrate a corporate network. By exploiting this overlooked IoT device, the attackers successfully bypassed traditional Endpoint Detection and Response (EDR) solutions, ultimately encrypting network shares and causing widespread damage.

How Calico Network Security Works

In the rapidly evolving world of Kubernetes, network security remains one of the most challenging aspects for organizations. The shift to dynamic containerized environments brings challenges like inter-cluster communication, rapid scaling, and multi-cloud deployments. These challenges, compounded by tool sprawl and fragmented visibility, leave teams grappling with operational inefficiencies, misaligned priorities, and increasing vulnerabilities.