threats

Understanding the NYDFS Cybersecurity Regulation
Whether you're a small financial service provider or a major institution, if you’re doing business in the state of New York, you need to meet New York Department of Financial Services (NYDFS) ...

CMMC Compliance Requirements: A Complete Guide
Department of Defense (DoD) data is some of the most sensitive out there. That’s why the DoD designed the Cybersecurity Maturity Model Certification (CMMC) framework. It helps software providers implement cybersecurity measures ...

What Is CI/CD Security? Risks and Best Practices
Continuous integration and continuous delivery (CI/CD) pipelines are invaluable in software development. They expedite the deployment process and maintain teams at the forefront of innovation. But with these benefits come unique security ...

7 Best AI Cybersecurity Tools for Your Company
With advanced AI cybersecurity tools, you bring powerful capabilities to your security strategy. AI enhances threat detection, automates key security tasks, and strengthens your overall security posture, completing tasks with speed and ...

Barracuda Networks Report Sees Sextortion Becoming More Personalized
A report published by Barracuda Networks warns that sextortion attacks are getting even more personal and payment demands have increased ...

Leveraging Tabletop exercises to Enhance OT security maturity
Has your organization tested its OT security incident response plan in the last 6 months? Do you remember when you last checked your institutional OT security awareness levels? Are your OT security ...

How Cybersecurity Training Must Adapt to a New Era of Threats
We have entered a new era of cyberthreats, and employees must be equipped to defend the company from more cunning and effective attacks than ever ...

SLSA Framework: What is It and How to Gain Visibility
In Part 2 of this blog series, we uncover the details of SLSA provenance from end to end. Previously in Part 1, we started by reviewing in-toto attestations, which are the underlying ...

PCI DSS Self-Assessment Questionnaires: Choosing the Right Type
If you process credit card payments, you need to prioritize security. One way to guarantee this safety is by complying with Payment Card Industry (PCI) Data Security Standards (DSS) ...

How to evaluate OT security program maturity
An OT security program can lead to better resource use, improved security operations, and tangible gains for the security posture of an OT operator. The benefits of running an OT security program ...