Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

The Aftermath of the Kaspersky Ban

In the spring of 2024, amid growing international concern about supply chain risk and the trust and reliability of technology suppliers, the United States banned Kaspersky Lab, Inc., the Russia-based antivirus company from providing its products to the US market. The ban went into effect on September 30, 2024. What impact has the ban had on US and global usage of Kaspersky? Has it been effective? A new analysis from Bitsight contains some surprising results.

Managing NERC CIP Patching Process With Tripwire Enterprise and Tripwire State Analyzer

One of the hardest parts of managing an organization’s cybersecurity is patch management. Just as one patch cycle is completed, another set of patches are released. When compounded with the highly regulated energy industry, governed by the NERC CIP Standards, the task becomes even more daunting. Fortunately, Fortra’s Tripwire Enterprise (TE) and Tripwire State Analyzer (TSA) can ease the process.

CIS Control 08: Audit Log Management

Audit logs provide a rich source of data critical to preventing, detecting, understanding, and minimizing the impact of network or data compromise in a timely manner. Collection logs and regular reviews are useful for identifying baselines, establishing operational trends, and detecting abnormalities. In some cases, logging may be the only evidence of a successful attack. CIS Control 8 emphasizes the need for centralized collection and storage and standardization to better coordinate audit log reviews.

Leading security frameworks for CSPM

Cloud Security Posture Management (CSPM) has become essential for monitoring cloud infrastructure, identifying risks, and enforcing security policies. As cloud adoption grows, managing the complexity of these environments—where misconfigurations and vulnerabilities can lead to breaches—requires a robust approach. This is where security frameworks come into the picture. Security frameworks offer structured guidelines and best practices for managing and improving security posture.

Get a unified approach towards Compliance with NIS2 and DORA

In the cyber security domain, the increase of cyber-attacks alongside the acceleration of businesses’ digital transformation, drive states to deploy a more ringent regulatory framework to protect data and establish a code of conduct for businesses. In this perspective, it is essential to view compliance as an integral component of the wider governance framework, which is grounded in international standards of an interconnected world that makes best use of already tested best practices.

Applying MITRE ATT&CK framework to your Active Directory

Active Directory is a cornerstone of IT systems, handling user authentication, permissions, and access to resources. Its importance makes it a main target for attackers trying to get unauthorized access, escalate privileges, or cause disruptions. The MITRE ATT&CK framework, a comprehensive knowledge base of adversary tactics, techniques, and procedures (TTPs), serves as a valuable tool to identify, prevent, and respond to such threats in your AD environment.

Guide to Reducing False Positives & Ensuring Data Accuracy with XDR Solution

As the threat landscape of cybersecurity continues to evolve, enterprises now find themselves spending countless hours on identifying and mitigating potential threats while managing overwhelming amounts of data. But one persistent problem for security teams is the flood of false positives alerts that indicate possible threats but turn out to be benign. Not only do these waste valuable time and resources, but they also contribute to alert fatigue, reducing the overall threat detection ability of teams.