Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Protect Against HTTP Attacks with HTTPS Strict Transport Policy

Web communications can be routed over the Hypertext Transfer Protocol (HTTP) and the Hypertext Transfer Protocol Secure (HTTPS). The latter ensures encrypted data transfer between a website and a user. Some sites will offer both HTTP and HTTPS connections, but any HTTP connection may be vulnerable to cyber attacks. To require that all connections route over HTTPS, you can set up an HTTPS Strict Transport Policy (HSTS) to enforce secure connections.

Over 700K Indiana Medicaid Recipients Exposed in Data Breach

The Indiana Medicaid program helps state residents who fall into a lower income bracket. These individuals use the program to obtain medical care. To qualify for the program, individuals must present their financial statements and other personal data to the government organization. Some or all of this data could be at risk if the organization is compromised. After learning the Medicaid program was compromised, we were concerned about all the individuals that could be impacted.

Power of AI: Your InfoSec Professional's Trusty Sidekick

Ever wondered what the future of information security looks like? 🤖🔐 In this video, we're diving deep into the concept of having an AI companion for your InfoSec professional. Picture it: Your InfoSec expert is the brains of the operation, making all the critical decisions to keep your data safe. But right there on their shoulder is a trusty AI sidekick, analyzing mountains of data faster than you can blink and serving up all the info needed for those informed decisions.

Coffee Talk with SURGe: The Interview Series featuring Jamie Williams

Join Ryan Kovar and special guest Jamie Williams, MITRE ATT&CK for Enterprise Lead and Principal Adversary Emulation Engineer, for a discussion about MITRE ATT&CK use cases and Jamie's essay in a new book by SURGe titled, "Bluenomicon: The Network Defender's Compendium.".

Securing Cloud-Native Environments: Containerized Applications, Serverless Architectures, and Microservices

Enterprises are embracing cloud platforms to drive innovation, enhance operational efficiency, and gain a competitive edge. Cloud services provided by industry giants like Google Cloud Platform (GCP), Azure, AWS, IBM, and Oracle offer scalability, flexibility, and cost-effectiveness that make them an attractive choice for businesses. One of the significant trends in cloud-native application development is the adoption of containerized applications, serverless architectures, and microservices.

Why Companies Are Migrating To AWS With a Trusted Partner

If you’re reading this article, you’re likely already considering an AWS migration for your company. You already have a handle on some of the perks migrating to AWS can have on your business but are reluctant considering how much disruption nearly every industry experienced within the last year or more. Rather than opting for more change, you might consider holding on to what you know until this period of disruption comes to an end.

How AI is Helping Cybercriminals and What You Can Do for Your Protection

Artificial intelligence is an all-encompassing tool that leverages computer systems to mimic intelligent actions like solving problems and learning. Due to its general nature, AI can aid almost any endeavor. Sadly, this includes leveraging it for malicious purposes. How do cybercrooks use AI to aid their activities? Can you do anything about it? We explore answers to both!

Deciphering alphabet soup: IoCs and IoAs

Security Operations teams are the cornerstone of the fight against last-mile cybercrime in any organization. This is why they need the most advanced technologies possible.But the fight against cybercriminals isn’t simply a question of technology. Having a proactive attitude against possible cyberattacks is also key. This is where we see two essential concepts for all Security Operations teams: IoCs (indicators of compromise) and IoAs (indicators of attack). What is the difference?