Implementing container security best practices using Wazuh

April 9, 2024 at 11:37AM Containerization has revolutionized application deployment and management, emphasizing security compliance in containerized environments. Wazuh, a free open-source security platform, addresses this need by providing visibility, granular access controls, vulnerability scanning, and monitoring for Docker and Kubernetes containers. It aids in maintaining regulatory compliance and strengthening container security, making it an … Read more

Accelerating Security Risk Management

November 21, 2023 at 03:09PM In this article, Mike Milner, Trend Micro VP of Cloud Technology, discusses the role of security risk management in the era of cybersecurity and how IT leaders are accelerating innovation. The article also highlights the challenges faced by organizations in managing the digital attack surface and the importance of resilience, … Read more

Your end-users are reusing passwords – that’s a big problem

November 2, 2023 at 10:11AM Password reuse is a dangerous vulnerability that IT teams struggle to detect. According to a TechRepublic survey, 53% of people admit to reusing passwords, making it easier for hackers to gain access. Verizon estimates that 86% of attacks start with compromised credentials. Organizations need to take steps to mitigate this … Read more

The Rise of S3 Ransomware: How to Identify and Combat It

October 25, 2023 at 08:04AM Around 60% of corporate data is stored in the cloud, with Amazon S3 being a popular choice. However, S3 remains vulnerable to ransomware attacks as leaked access keys can be used to compromise sensitive data. To combat these threats, organizations need visibility into their S3 environment through CloudTrail and Server … Read more

Data Security and Collaboration in the Modern Enterprise

October 18, 2023 at 08:55AM Modern enterprises face the challenge of balancing the need for data collaboration and expanded access with the increased risk of cybersecurity threats. Traditional data security measures are insufficient for the data needs of modern enterprises. The CISO Survival Guide emphasizes the importance of data access control and the intersection of … Read more

Protect Critical Infrastructure With Same Rigor as Classified Networks

October 12, 2023 at 10:38AM The private sector’s utility, telecom, banking, transportation, and medical networks are facing unprecedented threats from state actors, particularly from China. The Director of National Intelligence warns that China is capable of launching cyberattacks that could disrupt critical infrastructure services within the United States. To protect their networks, organizations should cultivate … Read more