Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What is Configuration Drift?

While the phrase sounds like the stuff of textbook jargon, the term "configuration drift" hides an extremely crucial caution. Configuration drift is important because it can lead to compliance drift. Compliance drift means that the state of compliance has changed as a result of a configuration that has been changed, which has caused your system to fall out of compliance.

The Magic Quadrant for Single Vendor SASE and the Cato SASE Experience

Customer experience isn’t just an important aspect of the SASE market, it is its essence. SASE isn’t about groundbreaking features. It is about a new way to deliver and consume established networking and security features and to solve, once and for all, the complexity and risks that has been plaguing IT for so long.

Random but Memorable - Episode 11.2: Wannabe Barbie Watchtower Craze

From a wannabe rapper guilty of bitcoin laundering to scammers who are using Barbie-mania to steal personal information, we have all that and more in this episode’s Watchtower Weekly. 💰👠 We also sit-down with 1Password Business customer Vlad Boldura from Visma. He shares how Visma got started with 1Password, how they rolled it out across the organization, and the incredible impact it’s made since implementation.

Kojensi: Military-grade Sensitive & Classified Information Sharing Platform

Kojensi from archTIS is a highly secure, multi-level security platform for the secure sharing and collaboration of sensitive and classified files. By taking a data-centric, zero trust security approach, a file’s attributes such as security classification, organisation and country releasability, determine who is able to access, edit and download the file. Kojensi users can create, co-author and share documents in real-time, all in a secure and intuitive platform that ensure sensitive information remains need to know only.

NC Protect: Advanced Data Protection for Govt, Defense & Supply Chain in Microsoft 365 Applications

Empower your organization to take advantage of all the productivity and collaboration the Microsoft suite has to offer with meeting regulations including NIST, CMMC, and ITAR for information security. archTIS’ zero trust attribute-based access control (ABAC) powered information security solutions for public sector enhance native security capabilities to empower secure collaboration within your agency, with other agencies, defense, multinational coalitions and supply chain partners.

What is Attribute Based Access Control or ABAC?

The complete portfolio of archTIS solutions, including NC Protect and Kojensi, leverage a data-centric, attribute-based access control (ABAC) methodology to ensure the highest levels of data protection. Watch this video to learn about the advantages of using ABAC-enabled access and data protection policies to safeguard sensitive data.

Akira Ransomware, 8Base Ransomware, and more: Hacker's Playbook Threat Coverage Round-up: August 22, 2023

In this version of the Hacker’s Playbook Threat Coverage round-up, we are highlighting newly added coverage for several recently discovered or analyzed ransomware and malware variants, including Akira ransomware, 8base ransomware, and Rorschach (BabLock) ransomware, amongst others. SafeBreach customers can select and run these attacks and more from the SafeBreach Hacker’s Playbook™ to ensure coverage against these advanced threats.

CyberArk Global CIO on Balancing AI Opportunities and Risks

Generative artificial intelligence (AI) has officially arrived at the enterprise and is poised to disrupt everything from customer-facing applications and services to back-end data and infrastructure to workforce engagement and empowerment. Cyberattackers also stand to benefit: 93% of security decision makers expect AI-enabled threats to affect their organization in 2023, with AI-powered malware cited as the No. 1 concern.