Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

Fix common cloud security risks with the Essential Cloud Security Controls Ruleset

With the continual increase of attacks, vulnerabilities, and misconfigurations, today’s security organizations face an uphill battle in securing their cloud environments. These risks often materialize into unaddressed alerts, incidents, and findings in their security products. However, part of the issue is that many security teams are often stretched too thin and overburdened by alert fatigue.

How the Russia-Ukraine conflict changed cyber attacks: More attacks, More DDoS

The conflict between Russia and Ukraine includes a cyberwarfare component with government-supported threat actors and civilian hacktivists taking sides. The goals of disrupting IT infrastructure and utilities have led to a 4-fold increase in DDoS attacks between 4Q21 and 1Q22. Over 150,000 volunteers have joined anti-Russian DDoS campaigns using container images from Docker Hub.

How Graph-powered SSPM Adds the Right Context

SaaS apps have become the “easy button” for organizations seeking a fast and simple way to make foundational business apps available to their employees. According to Gartner, “SaaS remains the largest public cloud services market segment, forecasted to reach $176.6 billion in end-user spending in 2022,” growing 14% over 2021.

The Cost of Stolen Credentials

Credentials are a set of attributes that uniquely identify an entity such as a person, an organization, a service or a device. According to IBM’s Cost of a data breach report, compromised credentials were the primary attack vector of 19% of the data breaches the study highlights. A 2021 data breach report by ITRC reveals that cyberattacks, including credential stuffing, made up 88% of data breaches in Q3 of 2022.

Analyze security logs from Amazon Security Lake with Datadog

Amazon Security Lake allows customers to build security data lakes from integrated cloud and on-premises data sources as well as from their private applications. Directing your security telemetry into a unified data lake makes it easier to manage, analyze, and route security-log and event data to third-party SIEM solutions that leverage that telemetry.

Trustwave Recognized as a Leader in IDC MarketScape: Asia/Pacific Managed Security Services

Trustwave has been named as a Leader the IDC MarketScape: Asia/Pacific Managed Security Services 2022 Vendor Assessment (doc #AP4910122e, October 2022). According to the IDC MarketScape, “Trustwave has been aggressively working with enterprises and midmarket customers to offer effective MDR services that are easy and simple to implement with affordable pricing options.”

The Essential guide to Google Drive Data Loss Prevention (DLP)

Google Drive is an integral part of Google Workspace (formerly known as G Suite). With over 6 million customers and over 2 billion monthly active users, Google’s platform is the world’s largest collaboration tool for companies both large and small. In Google Drive, employees across the world create, edit, and share files on a daily basis. This, however, does not occur without the risk of data leakage.

Hackathon! How can blockchain solve supply chain visibility challenges?

PA Consulting recently joined forces with RKVST to host a Hackathon, looking to identify new and innovative propositions for digital supply chains. Could the teams of PA consultants and analysts identify opportunities to help their clients using RKVST technology? Short answer: YES! Many of today’s business challenges can be addressed with a reliable evidence ledger. If you want the long answer, read on.

The Essential Guide to CRM Data Loss Prevention in Salesforce

As with most SaaS applications, within Salesforce it is your organization’s responsibility to determine whether Salesforce’s default security settings meet your specific security and compliance obligations. Read this online guide, for free, to learn about the problem of data exposure in Salesforce and how to ensure compliance with HIPAA, PCI, and other leading industry standards while storing sensitive data in Salesforce.

Defining Autonomous SOC: How Tomorrow's SOC will Augment Analysts

It’s an ever-changing and ever-evolving threat landscape out there today. Bad actors are smarter, more sophisticated, and better at evading detection. Security teams are also facing a barrage of overwhelming information, continually expanding the stream of alerts that must be reviewed, triaged and investigated.