Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Importance of NDR Detection-in-Depth

Detection engineering has evolved into an art, contributing to the success rates of endpoint and network detection and response tooling capabilities. Used to effectively counter the increasing complexity of today’s cyber threat actors, high-fidelity detections can help an organization discover threats earlier, neutralizing them before further damage can occur.

Industry Trends and the Importance of Unified Identity Security

Enterprise attack surfaces continue to evolve through cloud-based infrastructure, the proliferation of connected devices, and reliance on third-party solutions. New vulnerabilities are emerging every day from security gaps in the software supply chain to use of AI and cybercriminals are being proactive in exploiting them. Comprehensive Identity Security is a critical element to containing these new risks but maintaining best practices for a robust IAM strategy using multiple security tools has never been more challenging. This session will address how to reduce human error, avoid gaps and overlaps of your different IAM tools, and bring your security strategy in-line with the challenges of today and tomorrow's cyber threats.

Slaying the many headed hydra of data privacy and protection

With data traveling the world through borderless networks data privacy and protection laws have never been as important as they are today. Over 120 global jurisdictions now have data privacy and protection laws. California to China are implementing legislation that mirrors Europe’s GDPR, while the EU has turned its attention to a new EU Data Act as well as regulating the use of AI. Where once organizations were always ahead of regulators, now they struggle to keep up with compliance requirements across multiple jurisdictions. In this session, we will discuss the current state of compliance regulations, what’s coming next and how you can stay ahead.

What Is a SOC 2 Bridge Letter? With Examples!

Picture this: you’re a service organization that has aced your SOC 2 audit, and now your prospects are becoming customers at record speed as you prove your commitment to data security. But what happens in the interim period between one SOC report and the next? Enter the SOC 2 Bridge Letter, which fills the gap and keeps your compliance game on point. In this blog post, we’ll dive deep into the world of bridge letters, exploring their significance, components, and responsibilities.

5G's role in telemedicine: The future is now

Healthcare and technology have always gone hand in hand. Telemedicine, which lets you talk to doctors without visiting them in person, is a great example. A few years back, it might have sounded like science fiction. But today, it's a regular part of many people's lives. In fact, data shows that 80% of people have used telemedical services at least once in their lives.

KnowBe4 Named a Leader in the Fall 2023 G2 Grid Report for Security Awareness Training

We are thrilled to announce that KnowBe4 has been named a leader in the latest G2 Grid Report that compares security awareness training (SAT) vendors based on user reviews, customer satisfaction, popularity and market presence. The latest G2 Grid Report compares Security Awareness Training (SAT) vendors based on user reviews, customer satisfaction, popularity and market presence.

CrowdStrike Partners with Box to Add Automated Protections Against Security Breaches and Data Loss

The risk of cyberattacks continues to grow for small to medium-sized businesses (SMBs). Today, a staggering 70% of cyberattacks target SMBs, a scourge that cost organizations with fewer than 500 employees an average of $3.31 million USD in 2022, up 13.4% over the previous year. Adversaries tend to take the path of least resistance. This often means targeting small businesses, which face many of the same security threats as large organizations but lack the resources to defend against them.

Hackers Break into Flagstar Bank via Fiserv and MOVEit Vulnerabilities

Flagstar Bank is one of the largest national banks in the country. They operate over 430 branches and 120 banking teams from coast to coast. Flagstar is also the nation’s second-largest mortgage warehouse lender, servicing over 1.6 million accounts. Flagstar Bank’s conglomerate is based in New York, while their servicing is in Michigan. Flagstar oversees billions of dollars in loans, deposits, assets, and equity.