Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Fortify Your Security with Passwords and Password Managers

The internet has become an integral part of our daily lives, protecting our online accounts and sensitive information is more critical than ever. Passwords are the first line of defense against cyberattacks, and their strength is essential in safeguarding our identities. In this blog post, we’ll cover passwords and password managers, exploring the significance of strong passwords and the role that password managers play in enhancing our online security.

Friday Flows Episode 9: Grant Temporary Application Access with Pages

A common challenge we hear from IT teams is the constant barrage of requests for applications. These can come from new hires, people transitioning roles, consultants & third-parties, etc. Whitney Young runs through a great story using Tines pages where folks can initiate a self-serve application request that triggers an automation workflow to.

NASA, GSA, and Department of Defense Propose Rule to Standardize Cybersecurity Requirements for Federal Contracts

Several U.S. federal agencies have proposed a rule, FAR Case 2021–019, and issued a call for public comment to standardize cybersecurity contractual requirements for unclassified federal information systems and a statute on improving the nation's cybersecurity.

Revealed! The top 10 cybersecurity misconfigurations, as determined by CISA and the NSA

A joint cybersecurity advisory from the United States's National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) has shone a light on the top ten most common cybersecurity misconfigurations found in large private and public organisations. The report aims to detail the weaknesses found in many large organisations, and the need for software makers to properly embrace the principles of security-by-design.

How to Create a Cybersecurity Board Report (3 Best Practices)

Your board of directors expects to be regularly updated about your data breach prevention efforts, but board members often lack the necessary technical insight to understand the cyber risk mitigation processes making up your cybersecurity posture. CISOs are tasked with bridging the gap between awareness of your organization’s security efforts and stakeholder KPIs with the support of an invaluable tool - a cybersecurity board report.

Falcon LogScale Live Dashboards: Demo Drill Down

Monitoring security events in real-time empowers you to find stealthy threats and spot attack trends early. See how Falcon LogScale’s live dashboards provide a flexible, intuitive way to visualize your security data. You'll learn how to build a MITRE ATT&CK dashboard that automatically updates with live data.

Clorox Experiences Significant Financial Loss Stemming From Recent Cyber Attack

American global manufacturer of cleaning products Clorox stated that recent sales and profit loss to a cyber attack. In a statement from Clorox's press release, "As previously disclosed, the Company believes the cybersecurity attack has been contained and the Company is making progress in restoring its systems and operations. The available information does not confirm whether the Clorox cyber attack was a ransomware incident.