Friday Five: Unsuspecting Threats, New CUI Guidance, & More
This past week, BreachForums was taken down for a second time, an Arizona woman was arrested for her role in a North Korean remote work scheme, CISA and the NIST released new guidance, and more. Catch up on all the latest news in this week's Friday Five.
Audit Log Best Practices for Security & Compliance
Audit log best practices include defining clear log policies, regularly reviewing logs, and maintaining the integrity and use of management tools. Learn more audit best practices in today's blog.
Friday Five: Updated International Cyber Policy, Insights from DBIR and ONCD Reports, & More
As more insights continue to be unveiled from Verizon's DBIR report and a recently released report from the ONCD, governments and organizations are fighting to keep up with evolving threats. Get up to speed on these stories, the unmasking of LockBit's top admin, and more in this week's Friday Five.
Friday Five: Verizon's DBIR Findings, Biden's Critical Infrastructure Blueprint, & More
Verizon's annual Data Breach Investigations Report topped this past week's headlines. Read about their findings, more on the fight to secure critical infrastructure, a malware threat impacting at-home workers, and more in this week's Friday Five.
Code Protection: How to Protect Your Source Code
Code protection refers to the measures and strategies used to secure and safeguard source code from unauthorized access, theft, and misuse.
New CERT-In Guidelines for Security Breaches: What You Need to Know
In India, new CERT-In guidelines for security breaches have introduced new requirements for businesses to comply with, including one that requires organizations to report certain cybersecurity incidents to the office within six hours of discovery.
Friday Five: Controversial Data Privacy Legislation, Protecting Critical Infrastructure, & More
A major data privacy bill and proposed regulation have taken steps forward to becoming reality this past week. Meanwhile, China looms large as a significant cybersecurity threat and agencies are taking action to prepare. Catch up on these stories and more in this week's Friday Five.
What Is Audit Logging? How It Works & Why You Need It
An audit log is a document that records the activities within an application, system, or network. Learn more about audit logging in today's blog.
Friday Five: Incoming Regulatory Changes, a New Malware Threat, & More
Catch up on all of this past week's headlines, including changes coming to water system cyber standards and personal data purchasing power, a familiar, yet updated malware threat, and more.
What Is Data Sanitization? How It Protects Your Organization
Data sanitization is the irreversible and permanent elimination of sensitive data from a storage device, rendering it unrecoverable or reconstructable.
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.
Thank you for subscribing!