Achieving Cyber Resilience with Managed Detection and Response
Blog Published: 12/13/2024
Originally published by HCLTech.Written by B. Mani Shankar, Global Manager – MDR, Cyber Threat Intel & Incident Response Services, Cybersecurity, HCLTech. In today’s hyper-connected digital landscape, cyber threats have become more sophisticated, pervasive and difficult to detect. With ...
New Report from Cloud Security Alliance Highlights Key Aspects of Data Resiliency in the Financial Sector
Press Release Published: 12/10/2024
Findings emphasize the importance of regulatory compliance, strategic cloud adoption, regional considerations, and the need for continuous improvement in security practices SEATTLE – Dec. 10, 2024 – Financial institutions (FIs) are cautiously but increasingly adopting cloud technologies, while...
Level Up Your Cloud Security Skills With This Jam-Packed Training Bundle
Blog Published: 12/11/2024
Written by Kayla Mauriello.Seasoned cybersecurity professionals from CTOs to developers are facing a challenging situation: organizations transitioning to new cloud architecture are invariably exposed to new vulnerabilities that traditional security measures don’t address. Keeping pace with th...
Test Time Compute
Blog Published: 12/13/2024
Written by Ken Huang, CEO of DistributedApps.ai and VP of Research at CSA GCR.Everyone seems to talk about Test-Time Computation or Test Time Compute (TTC) as a way to scale the reasoning capability of large language models (LLMs). What is it about and why is it important now? This blog post i...
Zero-Code Cloud: Building Secure, Automated Infrastructure Without Writing a Line
Blog Published: 12/16/2024
Written by Rahul Kalva.Abstract In today’s fast-paced DevOps environment, the demand for agile infrastructure deployment is driving innovation beyond traditional Infrastructure-as-Code (IaC). Code-less deployment solutions represent a breakthrough, enabling teams to automate infrastructure se...
Decoding the Volt Typhoon Attacks: In-Depth Analysis and Defense Strategies
Blog Published: 12/17/2024
Originally published by InsiderSecurity.The Volt Typhoon campaign has raised alarms across cybersecurity circles, targeting critical infrastructure with stealthy and sophisticated techniques. This analysis breaks down the methods, exploitation tactics, and practical defenses organizations can ...
Managed Security Service Provider (MSSP): Everything You Need to Know
Blog Published: 12/18/2024
Originally published by Vanta.The security and compliance landscape is ever-evolving, meaning the demands organizations need to meet today can change rapidly. While most IT teams have defined processes to handle these requirements, they may not have the capacity to address all the tasks necess...
The EU AI Act and SMB Compliance
Blog Published: 12/18/2024
Originally published by Scrut Automation.Written by Nicholas Muy, Chief Information Security Officer, Scrut Automation.On July 12, 2024, the European Union (EU) Official Journal published the full text of the AI Act. This set into motion the final chapter of the most impactful security and pri...
Why Digital Pioneers are Adopting Zero Trust SD-WAN to Drive Modernization
Blog Published: 12/19/2024
Originally published by CXO REvolutionaries.Written by Mike Gemza, CTO, Cornerstone Building Brands.At a time when cyberthreats are becoming more advanced and network infrastructure needs are increasing, it's not just important to use a zero trust approach to software-defined wide-area network...
How to Demystify Zero Trust for Non-Security Stakeholders
Blog Published: 12/19/2024
Written by Erick Tauil, Presales Engineer.Alright, let’s dive into a topic that often feels like a riddle wrapped in an enigma: Zero Trust. Communicating its concepts to non-security stakeholders can be quite frustrating and often met with a blank stare. After 15 years in cybersecurity, I’ve s...
Global Data Sovereignty: A Comparative Overview
Blog Published: 01/06/2025
Written by Thales.In a cloud-driven world where data is stored off-premises and distributed across global servers, the question of who controls data is complex. Maintaining control over data becomes increasingly crucial for businesses as data grows in value. This concern gave rise to the conce...
Mastering Security Compliance with Continuous Controls Monitoring
Blog Published: 01/02/2025
Originally published by RegScale.Written by Ivy Shelby.With regulations in a constant state of flux, compliance has become a continuous, strategic priority rather than a mere checklist task. As businesses expand and their operations become more intricate, managing compliance grows more complex...
Modern Day Vendor Security Compliance Begins with the STAR Registry
Blog Published: 12/20/2024
We require a modern approach to accurately assess our use of current technology.This month marks 25 years since I managed my first cybersecurity attack. At the time, I was CTO for an internet service provider that suffered the compromise, which in those days was mostly script kiddies defacing...
The Critical Role of OT Security in the Oil and Gas (O&G) Industry
Blog Published: 01/03/2025
Originally published by HCLTech.Written by Devkant Sharma, Group Manager, PMG Lead, Cybersecurity, HCLTech.In today's increasingly digitized world, Operational Technology (OT) systems, which encompass the hardware and software that monitor and control physical devices, processes and events, ar...
Lanes in the Road: How Small and Medium Businesses Can Allocate Cybersecurity Responsibility
Blog Published: 01/06/2025
Originally published by Scrut Automation.Written by Nicholas Muy, Chief Information Security Officer, Scrut Automation.After suffering a devastating ransomware attack in early 2023, the law firm Mastagni Holstedt turned around and sued its Managed Service Provider (MSP), LanTech. While the leg...
Navigating Cloud Challenges with Repatriation
Blog Published: 01/07/2025
Written by Rajesh Awasthi, VP & Global Head of Managed Hosting and Cloud Services, Tata Communications.Originally published by DQ India.Cloud computing has transformed business operations with its scalability, flexibility, and cost-efficiency, encouraging organisations to modernise their I...
Breaking Into the U.S. Market: Cybersecurity Compliance to Fuel International Growth
Blog Published: 01/08/2025
Originally published by BARR Advisory.Expanding into the U.S. market offers Europe-based cloud service providers (CSPs) exciting new growth opportunities—but cybersecurity standards aren’t exactly the same across the pond. For security leaders who are used to GDPR and other European frameworks...
What is Protocol Break? A Deep Defense to Isolate Attackers in the Cloud
Blog Published: 01/09/2025
Originally published by Reemo.Written by Florent Paret.In today's digital landscape, marked by a proliferation of increasingly sophisticated cyberattacks, secure remote access to information systems has become a top priority. Protocol break, a technique that involves isolating systems by inter...
How to Secure Cloud Environments and Minimize Data Breach Risks
Blog Published: 01/10/2025
Originally published by Tenable. Written by Gad Rosenthal. The rapid shift to cloud computing has transformed how organizations manage and store their data. But as cloud adoption has grown, the risks have been heightened as well. Seeing opportunity, cybercriminals are increasingly targeting c...
Next-Gen Cybersecurity with AI: Reshaping Digital Defense
Blog Published: 01/10/2025
Written by Rahul Kalva.Abstract As the cyber threat landscape evolves, leveraging Artificial Intelligence (AI) has become imperative for creating robust, proactive defenses. AI's ability to detect, predict, and respond to threats in real-time sets it apart as a transformative force in cyberse...