Deliver ISO Compliance with Automation
Credit to Author: Melissa Clow| Date: Tue, 04 Jul 2023 00:00:00 +0000
Learn the ISO security and cloud compliance as well as the automated mechanisms to ensure those standards.
Read moreCredit to Author: Melissa Clow| Date: Tue, 04 Jul 2023 00:00:00 +0000
Learn the ISO security and cloud compliance as well as the automated mechanisms to ensure those standards.
Read moreCredit to Author: Melissa Clow| Date: Tue, 04 Jul 2023 00:00:00 +0000
Explore the Operational Excellence pillar of the AWS Well-Architected Framework and examine best practices and design principles for cloud-based security operations, including CI/CD and risk management.
Read moreCredit to Author: Lucas Silva| Date: Fri, 30 Jun 2023 00:00:00 +0000
We found that malicious actors used malvertising to distribute malware via cloned webpages of legitimate organizations. The distribution involved a webpage of the well-known application WinSCP, an open-source Windows application for file transfer. We were able to identify that this activity led to a BlackCat (aka ALPHV) infection, and actors also used SpyBoy, a terminator that tampers with protection provided by agents.
Read moreCredit to Author: Melissa Clow| Date: Thu, 29 Jun 2023 00:00:00 +0000
Achieve NIST compliance for your business without slowing down your team.
Read moreCredit to Author: Melissa Clow| Date: Tue, 27 Jun 2023 00:00:00 +0000
Discover the six Amazon Web Services (AWS) pillars by examining best practices and design principles to leverage the cloud in a more efficient, secure, and cost-effective manner.
Read moreCredit to Author: Melissa Clow| Date: Tue, 27 Jun 2023 00:00:00 +0000
Explore how to fulfil HIPAA compliance standards without friction
Read moreCredit to Author: Shannon Murphy| Date: Fri, 23 Jun 2023 00:00:00 +0000
New uses for generative AI are being introduced every day—but so are new risks.
Read moreCredit to Author: Arianne Dela Cruz| Date: Fri, 23 Jun 2023 00:00:00 +0000
The Trigona ransomware is a relatively new ransomware family that began activities around late October 2022 — although samples of it existed as early as June 2022. Since then, Trigona’s operators have remained highly active, and in fact have been continuously updating their ransomware binaries.
Read more