Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

5 Telltale Signs You're Running a Cloud-Hosted - Not a Cloud-Native - SIEM

The necessity of a SIEM for organizations and their security teams has evolved dramatically over time. It has gone from edge use cases and compliance to the current preferred form of threat detection, hunting, and incident response. As the use cases have changed, so has the architecture. As a result, organizations that have been running their SIEM on-premises are now looking for modern architectures to reduce the workload on their analysts. The simple choice: SaaS, of course.

The Road to Continuous Compliance

Compliance is often viewed as a “one and done” activity – an annual rite of passage, for example, performed during yearly audits. That is an archaic approach to compliance in the modern business world, and won’t suffice any longer. Instead, organizations must adopt a mindset of continuous compliance, where adherence to regulatory requirements becomes integral to day-to-day operations. How can a company achieve that evolved state?

Understanding the Differences Between DFARS and CMMC

Cybersecurity challenges continue to grow in impact and complexity, especially as they relate to government and Defence information. In response to increasing hacking and cyber attacks, the Department of Defense (DoD) has released the DFARS and CMMC information management and cybersecurity standards to reduce the risk of system compromises within government agencies and the defense industrial base (DIB) that supports them.

Why Do I Need a Password Manager if I Have iCloud Keychain?

If you use iCloud Keychain, you should switch to a dedicated password manager because it has superior security and more features to help you streamline password and data management. Password managers are cross-functional, allow you to securely share passwords, provide you with the ability to store more than just passwords and have secure add-ons available to further protect yourself. Continue reading to learn why you should use a password manager if you’re currently using iCloud Keychain.

What is Threat Intelligence?

Threat intelligence is one of the most potent weapons we have against digital hazards. Yet, many organizations remain uncertain about what it entails, how to apply it effectively, and what threat intelligence solution to choose. This lack of understanding could be detrimental as cyber threats continue to evolve, becoming more sophisticated and disruptive. So, what is threat intelligence, and how can it help bolster an organization’s security posture?

DFARS Compliance: What You Need to Know

Businesses that work with the US Department of Defense (DoD) and collect, process, transmit, or store controlled unclassified information (CUI) must comply with Defense Federal Acquisition Regulation Supplement (DFARS) standards. The DoD has responded to the growing threat of cyber incidents, including cyberattacks from cybercriminals and nation-states, by prioritizing cybersecurity best practices and insisting they are implemented throughout the DoD supply chain.

Customers and Employees of Talcott Resolution Life Insurance Likely Lost Data to Recent Breach

Talcott Resolution Life Insurance is a newer company founded in 2018. The organization specializes in life insurance and annuity offerings. It's located in Windsor, Connecticut, and has an annual revenue of $1.6 billion. The organization is responsible for managing about one million insurance contracts currently, which is a serious concern since the company was recently breached. This data breach could lead to substantial customer losses if those involved don't react quickly enough.