Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Encryption Key Management in Microsoft 365

Encryption is an essential means of protecting sensitive information and is required for certain types of data under many regulations. As more companies move to the Cloud and introduce Microsoft 365 (M365) applications like Teams and SharePoint Online to their communication and collaboration channels, the potential for data getting into the wrong hands grows exponentially making encryption strategies essential.

Kubescape adds CIS benchmark, boosting security and compliance scanning

Kubescape can now automatically scan Kubernetes clusters against the Center for Internet Security (CIS) benchmark, identify compliance gaps, suggest remediations, and monitor for drifts. This feature was born as a direct response to requests we received from Kubescape’s community and we’re excited to launch it. In this version, Kubescape supports CIS Kubernetes V1.23. In the next releases CIS GKE, AKS, and EKS frameworks will be supported as well.

How the Travel Industry is using emerging technologies in Identity Verification and Digital Onboarding

As per the World Economic Forum, digitization processes in travel, tourism, and the aviation industry will build up to $305 billion in value between 2016 and 2025. Digitalization has sped up the onboarding processes for the travel industry. And at the same time, it has also smoothened the customer travel experience. However, the travel sector has to deal with a large number of customers in a day. As you all know, they come under a lot of pressure to deliver efficient and quick services.

Data Protection in Healthcare - 8 Tips for Securing Your Data

Healthcare organizations collect and accumulate data rapidly. This makes data protection in healthcare so difficult. The more data you have, the more privacy and security risks there are. Data breaches can affect your organization’s reputation. They can also incur major costs. For instance, HIPPA violations can be as much as $1.5 million yearly. And they will hold you – the healthcare provider – responsible for data breaches.

Employee Monitoring & Insider Threat Detection in a Post COVID World

In our post-COVID, work from home world, employee monitoring and Insider Threat Protection have never been more important or in-demand. These essential tools ensure employee productivity while protecting sensitive data and industry compliance. Join us for a free webinar on 18th October at 15.30 IST, brought to you by Veriato, the leader in activity monitoring and insider risk solutions for the work from anywhere world.

Risks that third-party vendors pose to outsourcing banks

The banking and financial sector is known for its dependence on third-party vendors that help provide customers with quality financial products and services. It is one of the most interconnected sectors, making it one of the most vulnerable to cyberattacks. And because third parties operate through the banks they are contracted with, any losses are the bank's responsibility.

Leading financial institutions hedge risk by focusing on these 5 critical SIEM requirements

Digital transformation is expanding the attack surface in financial services. Throughout the pandemic, the accelerated adoption of digital banking, payments, and insurance channels has enabled providers to offer greater levels of service, new financial products, and enhanced journeys to their customers. However, with growing amounts of data and increasingly complex IT ecosystems, bad actors are finding more creative ways of wreaking havoc. In fact, U.S.

Election Security: Continued Vigilance Is Key

Cyber threats to elections in the U.S. and abroad remain at an elevated level and continue to evolve. It’s appropriate and encouraging to see continued growth and investment in cybersecurity efforts within elections communities. As a longstanding leader in defending elections globally, CrowdStrike understands the importance of these efforts and we want to do our part to help raise and sustain awareness.