Getting Started with PCI DSS Compliance
Posted by: Kyle Dimitt
If your business is involved in the processing of credit card payments, you are likely required to comply with the Payment Card Industry Data Security Standards (PCI DSS). Navigating the questions around PCI DSS compliance and what you need to…
Read More
April 16, 2024
Key Components of a Robust Cloud Security Maturity Strategy
A cloud security maturity strategy is dynamic and evolves over time to address new threats, technologies, and business requirements. It involves a holistic and proactive approach to security, emphasizing continuous improvement and adaptability in the ever-changing landscape of cloud computing.…
Read More
March 18, 2024
Healthcare Ransomware Attacks: Understanding the Problem and How to Protect Your Organization
Posted by: Gabrielle Hempel
To say we live in an increasingly digital world would be quite an understatement. Modern technology is even intertwined deeply with the fabric of healthcare systems. As such, the specter of ransomware attacks looms larger than ever before. Defined as…
Read More
March 12, 2024
Generative AI and Cybersecurity: The Impact on CISOs and Security Teams
Generative AI, a subset of artificial intelligence (AI), has emerged as a transformative force in the today’s digital world. This kind of advanced technology uses machine learning models to generate content, enabling it to autonomously create new and innovative solutions.…
Read More
February 19, 2024
How To Monitor Kubernetes Audit Logs
Posted by: Ashok Chokalingam
In today’s fast-paced landscape of container orchestration, Kubernetes is a powerful tool for managing and scaling applications. However, ensuring the security and compliance of these environments cannot be overlooked. One crucial aspect of building a successful application includes handling Kubernetes…
Read More
February 15, 2024
Why SaaS SIEM? A Comprehensive Guide for Businesses
Today’s businesses are increasingly reliant on technology, meaning the importance of airtight cybersecurity cannot be overstated. As organizations navigate the complexities of the modern digital ecosystem, maintaining the integrity of their systems has become more than just a “nice to…
Read More
February 9, 2024
Do More with Security Orchestration, Automation, and Response (SOAR)
Today, security operations center (SOC) teams face dual challenges of acquiring both the right caliber and quantity of staff. Many organizations are in the early stages of transitioning from a focus primarily on prevention to a greater emphasis on detection…
Read More
January 12, 2024
2024 Cybersecurity Predictions
Posted by: Kelsey Gast
Entering a new year, the cybersecurity landscape is poised for significant shifts, driven by the dynamic interplay between technological advancements and persistent threats. In this blog, industry experts share their insights and predictions, offering a nuanced perspective on the cybersecurity…
Read More
January 9, 2024
On-Prem SIEM vs. Cloud-Native SIEM: Which One Is Right for You?
Security information and event management (SIEM) solutions are essential for organizations of all sizes to monitor their environment for security threats. SIEM solutions gather and scrutinize security logs originating from diverse sources like firewalls, intrusion detection systems, and web servers.…
Read More
December 8, 2023
Log Ingestion 101: Which Logs Should You Be Bringing Into Your SIEM?
Posted by: Gabrielle Hempel
Security information and event management (SIEM) tools are indispensable in an organization’s cybersecurity framework. SIEM tools collect, analyze, and correlate log data from various devices and applications across an organization to identify suspicious activities, enhance overall security posture, and ensure…
Read More
November 2, 2023
The Cybersecurity Brew, Ep. 7
From data breaches to cutting-edge technologies, we’re bringing you the latest bits of cybersecurity news that should be in your radar. Boost your cybersecurity knowledge while enjoying a virtual brew of the latest headlines and insights that are impacting…
Read More
September 20, 2023
What is SIEM? And How Does it Work?
Posted by: Kelsey Gast
What is SIEM? SIEM stands for security, information, and event management. SIEM tools aggregate log data, security alerts, and events into a centralized platform to provide real-time analysis for security monitoring. Security operation centers (SOCs) invest in SIEM software to…
Read More
September 18, 2023
Detecting a Phishing Email: 10 Things to Watch
Posted by: Eric Brown
As security professionals, we remain vigilant in identifying phishing attempts and actively seek information on defending against ransomware and phishing attacks. These topics hold paramount importance within the security community. It is well-known that phishing emails frequently serve as the…
Read More
September 18, 2023
How Water Utilities can Boost Their Cybersecurity Resilience
Around the world, water utilities are fighting an increasing battle against a rapidly evolving foe. Cybercriminals are targeting supply infrastructure intent on causing disruption, confusion, and losses. Tactics can include shutting down supply to consumers or tainting water with additives…
Read More
September 11, 2023
Ransomware: How to Defend Against a Four-Decade Old Foe
The first documented attack may have occurred back in the late 1980s, yet ransomware is still topping the list of cyberthreats faced by both organisations and individuals today. An ever-evolving form of malware, ransomware is designed to encrypt data files…
Read More
September 5, 2023
Artificial Intelligence – A Danger to Patient Privacy?
Posted by: Mikiann McIntosh
Industries worldwide have integrated artificial intelligence (AI) into their systems as it promotes efficiency, increases productivity, and quickens decision-making. ChatGPT certainly raised eyebrows as it demonstrated similar characteristics at the start of its debut back in November 2022. The healthcare sector…
Read More
August 28, 2023
SaaS vs. Cloud-Native: Definitions and Security Best Practices
Posted by: Matt Willems
There’s a disconnect in how we talk about applications that are no longer hosted within our own data center. When speaking with customers, we’ve observed that “software as a service” (SaaS) and “cloud-native” are terms that tend to be bundled…
Read More
August 16, 2023
What Comes After Your SIEM Purchase?
Posted by: Kevin D. Kirkwood
Let’s say you recently acquired a security information and event Management (SIEM) solution and now have a new layer of defense in the war against cybercriminals. Check! You’re done right? Not even close. The reality is there is still a LOT more…
Read More
July 24, 2023