Deliver ISO Compliance with Automation
Credit to Author: Melissa Clow| Date: Tue, 04 Jul 2023 00:00:00 +0000
Learn the ISO security and cloud compliance as well as the automated mechanisms to ensure those standards.
Read moreCredit to Author: Melissa Clow| Date: Tue, 04 Jul 2023 00:00:00 +0000
Learn the ISO security and cloud compliance as well as the automated mechanisms to ensure those standards.
Read moreCredit to Author: Melissa Clow| Date: Tue, 04 Jul 2023 00:00:00 +0000
Explore the Operational Excellence pillar of the AWS Well-Architected Framework and examine best practices and design principles for cloud-based security operations, including CI/CD and risk management.
Read moreCredit to Author: Lucas Silva| Date: Fri, 30 Jun 2023 00:00:00 +0000
We found that malicious actors used malvertising to distribute malware via cloned webpages of legitimate organizations. The distribution involved a webpage of the well-known application WinSCP, an open-source Windows application for file transfer. We were able to identify that this activity led to a BlackCat (aka ALPHV) infection, and actors also used SpyBoy, a terminator that tampers with protection provided by agents.
Read moreCredit to Author: Melissa Clow| Date: Thu, 29 Jun 2023 00:00:00 +0000
Achieve NIST compliance for your business without slowing down your team.
Read moreCredit to Author: Melissa Clow| Date: Tue, 27 Jun 2023 00:00:00 +0000
Discover the six Amazon Web Services (AWS) pillars by examining best practices and design principles to leverage the cloud in a more efficient, secure, and cost-effective manner.
Read moreCredit to Author: Melissa Clow| Date: Tue, 27 Jun 2023 00:00:00 +0000
Explore how to fulfil HIPAA compliance standards without friction
Read moreCredit to Author: Shannon Murphy| Date: Fri, 23 Jun 2023 00:00:00 +0000
New uses for generative AI are being introduced every day—but so are new risks.
Read moreCredit to Author: Arianne Dela Cruz| Date: Fri, 23 Jun 2023 00:00:00 +0000
The Trigona ransomware is a relatively new ransomware family that began activities around late October 2022 — although samples of it existed as early as June 2022. Since then, Trigona’s operators have remained highly active, and in fact have been continuously updating their ransomware binaries.
Read moreCredit to Author: Greg Young| Date: Thu, 22 Jun 2023 00:00:00 +0000
Just months after hitting the scene, generative AI already seems like it will become a permanent addition to the enterprise IT toolbox. For CISOs, the pressure is on to roll out AI security policies and technologies that can mitigate very real and present risks.
Read moreCredit to Author: David Fiser| Date: Wed, 21 Jun 2023 00:00:00 +0000
In this blog post, we discuss different configuration scenarios that may lead to security issues with Azure Service Fabric, a distributed platform for deploying, managing, and scaling microservices and container applications.
Read more