Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Detect Fraud Sooner with the Splunk App for Fraud Analytics

It will not come as a surprise to you that fraud and financial crime is continuing to challenge organizational business and cyber resiliency plans. Odds are you have dealt with fraud firsthand, or know someone experiencing the pains caused by fraud. Back in 2020 we shared some thoughts about how we believe leveraging a data platform like Splunk can help you gain more anti-fraud value and insights from your data and showed how you can determine what your data is worth.

Covered Entities vs Non-Covered Entities Under HIPAA

The Health Insurance Portability and Accountability Act (HIPAA) was enacted in 1996 and sets forth a comprehensive set of standards for protecting sensitive patient health information. The Privacy Rule applies to all entities that fall within the definition of a “covered entity“, which generally includes healthcare providers, health plans, and clearinghouses.

What DNS over HTTPS (DoH) Is & How to Enable in Windows 10

When your web browser accesses a website, it needs to first translate the friendly URL (such as Netwrix.com) to the public server IP address of the server that hosts that website. This is known as a DNS lookup. Traditional DNS is unencrypted, unlike modern HTTPS web traffic that’s almost entirely secured via HTTPS these days.

Evolving Threats in the Cloud and What They Mean

As organizations move data and infrastructure into the cloud, they open themselves up to new and novel cyber threats, often without realizing it. In this Fal.Con 2022 session, Duke McDonald, Strategic Threat Advisor, CrowdStrike, explains how to not only highlight threats in the cloud based on real adversary tactics and attacks, but also how to meaningfully address these risks.

Innovate with AWS and Secure with CrowdStrike

In the last two years, the shift to cloud adoption has only accelerated. This rapid shift has reinforced the profound importance of protecting IT assets from the latest cyber threats. AWS and CrowdStrike are working together to provide joint solutions for wherever you are in your cloud journey. From migrating VMware-based workloads in a lift or shift fashion or completely modernizing your infrastructure with microservices and containers, AWS and CrowdStrike have a solution to help you innovate and secure your infrastructure.

Women In Cyber Security | Razorwire Podcast

We're back with another episode of the Razorwire Podcast! In our new episode, we're going to talk about women in cyber security. As part of this, I've invited three fantastic women on this podcast who are leaders in their fields. Firstly, we have Megan Brown, our guest host for this episode. Megan is currently Head of International Sales at LogicGate. Megan’s guests today may be familiar to you from previous episodes: Stefania Chaplin, a solutions architect at GitHub, and Claire Davies, CISO at Arriva Group.

Unifying Construction Documents with Procore and Egnyte

It is not uncommon on the job site to find project teams using a variety of disparate applications to access, share and collaborate on documents - each with their own storage, permissions and controls. This makes it very challenging to manage that project information, as it flows in and out of teams, and across different software platforms.

Top Collaboration Challenges In Clinical Trial Outsourcing

For biotech organizations, collaboration is the lifeblood of clinical research. A typical clinical trial depends upon constant communication, data sharing, and myriad other interactions among sponsors, sites, CROs, and participants. A breakdown in collaboration can cause delays that threaten the entire operation.