Fortra's Digital Guardian https://www.digitalguardian.com/ Leading Provider of Threat Intelligence and Mitigation Solutions en Thu, 21 Nov 2024 00:09:19 -0600 Mon, 18 Nov 2024 12:45:18 -0600 What Are Data Mining Risks? How to Protect Against and Mitigate Them https://www.digitalguardian.com/blog/what-are-data-mining-risks-how-protect-against-and-mitigate-them Although digital operations like data mining can add immense value to customers and stakeholders, they also come with risks. Therefore, organizations must adopt strong data protection measures and regulations to address privacy concerns and mitigate data mining risks.What Are Data Mining Risks?Data mining risks refer to the potential pitfalls and negative consequences associated with data mining. These risks mainly include: Chris Brook 3864 2024-11-18T12:45:18-0600 Fortra's Digital Guardian Friday Five: North Korean Hackers at Work, Trump Cyber Appointments, & More https://www.digitalguardian.com/blog/friday-five-north-korean-hackers-work-trump-cyber-appointments-more Top Stories of the Week: 11/9/24-11/15/24Gain insight into what could be coming from the DHS and other agencies under Trump's second term, the latest updates on the actions of North Korean state hackers, and more. Robbie Araiza 3863 2024-11-15T13:54:36-0600 Fortra's Digital Guardian XDR vs MDR: What You Need to Know https://www.digitalguardian.com/blog/xdr-vs-mdr-what-you-need-know Extended Detection and Response (XDR) and Managed Detection and Response (MDR) are crucial cybersecurity tools, each serving distinct purposes.Extended Detection and Response (XDR) and Managed Detection and Response (MDR) are both cybersecurity tools, but they address different needs and operate in unique ways: Chris Brook 3862 2024-11-14T10:40:57-0600 Fortra's Digital Guardian The Role of a Chief Information Security Officer in Today’s Information Landscape https://www.digitalguardian.com/blog/role-chief-information-security-officer-todays-information-landscape In the current digital age, where cyber threats are growing and becoming more sophisticated, the role of a CISO is becoming increasingly indispensable in organizations.Therefore, since every organization has distinct needs, it's crucial to consider the factors outlined in this article when hiring a CISO. Chris Brook 3860 2024-11-11T11:06:13-0600 Fortra's Digital Guardian Friday Five: Election Consequences, New Workplace Threats, & More https://www.digitalguardian.com/blog/friday-five-election-consequences-new-workplace-threats-more Top Stories of the Week: 11/2/24-11/8/24As President-elect Donald Trump is set to take office in January, learn what he has in store for cyber policy, along with new threats organizations need to watch for, new TSA-proposed regulations, and more. Robbie Araiza 3859 2024-11-08T16:25:44-0600 Fortra's Digital Guardian What Is the General Data Protection Regulation (GDPR)? https://www.digitalguardian.com/blog/what-general-data-protection-regulation-gdpr The General Data Protection Regulation (GDPR) is a regulation enacted by the European Union to protect EU citizens' privacy and personal data. It came into effect on May 25, 2018, and applies to all companies that process the personal data of people living in the EU, even if the company is not located within the EU. Chris Brook 3858 2024-10-09T09:00:00-0500 Fortra's Digital Guardian Friday Five: Real-Life Cyber Consequences, New Ransomware Stats, & More https://www.digitalguardian.com/blog/friday-five-real-life-cyber-consequences-new-ransomware-stats-more As ransomware operators continue to expand the impact of their malware, CISA is proposing new requirements to help protect sensitive data, while the SEC is coming down on organizations that downplayed a historical breach. Learn all about these stories and more in this week's Friday Five. Robbie Araiza 3857 2024-10-25T12:00:00-0500 Fortra's Digital Guardian Friday Five: The Next Wave of Regulatory Compliance, Election Scams, & More https://www.digitalguardian.com/blog/friday-five-next-wave-regulatory-compliance-election-scams-more CISA Sees Elimination of 'Bad Practices' as Next Secure-by-Design Step by Matt BrackenThe Cybersecurity and Infrastructure Security Agency (CISA) has made significant strides in its secure-by-design initiative, gaining 230 software vendors' commitments to strengthen security features like multi-factor authentication and reducing default passwords. By shifting security responsibilities to software creators, CISA aims to ensure products are secure from the start, preventing end-users from facing unforeseen security risks later on. Robbie Araiza 3856 2024-11-01T12:00:00-0500 Fortra's Digital Guardian Understanding the Zero Trust Security Model to Safeguard Digital Infrastructure - Blog https://www.digitalguardian.com/blog/understanding-zero-trust-security-model-safeguard-digital-infrastructure What Is Zero Trust?Zero Trust is a cybersecurity model that requires verification of all internal and external access attempts, eliminating trust to prevent breaches. Originated by Forrester Research, Zero Trust mandates a policy of least privilege and strict identity verification for every person and device trying to access information on a private network, regardless of whether they are inside or outside the network. Chris Brook 3843 2024-10-23T15:04:00-0500 Fortra's Digital Guardian Friday Five: Threat Actors and Law Enforcement Throwing Punches, Vulnerability Concerns, & More https://www.digitalguardian.com/blog/friday-five-threat-actors-and-law-enforcement-throwing-punches-vulnerability-concerns-more As ransomware gangs and state-sponsored threat actors wage war against international law enforcement, private organizations, U.S. courts and agencies, and the manufacturing industry are urged to reinforce their cybersecurity measures. Learn all you need to know about these emerging threats in this week's Friday Five. Robbie Araiza 3836 2024-10-04T13:08:00-0500 Fortra's Digital Guardian XDR vs EDR: What You Need to Know - Blog https://www.digitalguardian.com/blog/xdr-vs-edr-what-you-need-know XDR and EDR solutions can help secure your corporate ecosystem from cyber threats, especially with the increasing number of remote workers. Read this blog to learn the differences between the technologies, how they work, and how to choose between the two.Cybersecurity solutions must optimize limited resources against an ever-evolving threat landscape. Choosing between EDR (endpoint detection and response) and XDR (extended detection and response) helps an organization to significantly optimize its resources. Chris Brook 3835 2024-10-07T23:52:00-0500 Fortra's Digital Guardian Friday Five: The Vulnerable Healthcare Industry, Workplace Cyber Threats, & More https://www.digitalguardian.com/blog/friday-five-vulnerable-healthcare-industry-workplace-cyber-threats-more HEALTHCARE'S GRIM CYBER PROGNOSIS REQUIRES SECURITY BOOSTER BY ROBERT LEMOSThe healthcare sector is increasingly vulnerable to cyberattacks, particularly ransomware, with 66% of organizations experiencing attacks in the past year, up from 60%. Emerging threats like the Trinity ransomware group are raising alarms, with cyberattacks like theirs disrupting services, exposing sensitive patient data, and affecting patient outcomes. Robbie Araiza 3832 2024-10-11T13:04:00-0500 Fortra's Digital Guardian Secure Access Service Edge (SASE): Moving Beyond Traditional IT Architecture https://www.digitalguardian.com/blog/secure-access-service-edge-sase-moving-beyond-traditional-it-architecture An increasingly remote workforce and edge computing applications have heightened the need to fortify perimeter-based defenses and build device trust. A prime solution for this challenge is the Secure Access Service Edge (SASE) architectural model, which incorporates many existing security solutions yet offers a unique, holistic approach to security and networking.Unlike traditional solutions, SASE is a cloud-based, single-service model that integrates a broad range of networking and security functions. Chris Brook 3831 2024-10-15T15:40:00-0500 Fortra's Digital Guardian What is SOX Compliance? - French https://www.digitalguardian.com/fr/blogue/quest-ce-que-la-conformite-sox UNE DÉFINITION DE LA CONFORMITÉ SOXEn 2002, le Congrès des États-Unis a adopté la loi Sarbanes-Oxley (SOX), celle-ci vise à protéger les actionnaires et le grand public contre les erreurs comptables et les pratiques frauduleuses menées dans les entreprises, mais aussi pour améliorer l'exactitude des informations fournies par les entreprises. La loi fixe des délais pour la conformité, elle publie aussi des règles sur les exigences. 3829 2022-10-13T12:49:51-0500 Fortra's Digital Guardian What is SOX Compliance? - German https://www.digitalguardian.com/de/blog/was-bedeutet-sox-compliance EIN DEFINITION FÜR SOX-COMPLIANCEIm Jahr 2002 verabschiedete der US-Kongress den Sarbanes-Oxley Act (SOX), um Aktionäre und die Öffentlichkeit vor Rechnungslegungsfehlern und betrügerischen Praktiken von Unternehmen zu schützen und die Genauigkeit der Unternehmensangaben zu verbessern. Im Gesetz sind Fristen für die Einhaltung und Regeln in Bezug auf Anforderungen festgelegt. 3829 2022-10-13T12:49:51-0500 Fortra's Digital Guardian Friday Five: Data-Stealing Malware, Ransomware Groups Casting a Wide Net, & More https://www.digitalguardian.com/blog/friday-five-data-stealing-malware-ransomware-groups-casting-wide-net-more Ransomware groups continue to target organizations across multiple industries. Meanwhile, government entities are urged to be vigilant of data-stealing malware, law enforcement continues to punch back against cybercrime groups, and more. Get up to speed in this week's Friday Five. Robbie Araiza 3820 2024-09-13T14:03:00-0500 Fortra's Digital Guardian Digital Guardian Supports macOS 15 Sequoia with Version 8.8! - Blog https://www.digitalguardian.com/blog/digital-guardian-supports-macos-15-sequoia-version-88 Fortra's Digital Guardian is proud to offer day one support for macOS 15.0 Sequoia!We are happy to announce that with the release of the Digital Guardian Mac Agent v8.8, our product now supports macOS 15.0 Sequoia.This update has been certified against the latest macOS release build, ensuring a seamless upgrade experience for our users. John Meehan 3819 2024-09-16T17:18:00-0500 Fortra's Digital Guardian What is POPIA, and How Do You Achieve Compliance? - Blog https://www.digitalguardian.com/blog/what-popia-and-how-do-you-achieve-compliance POPIA, South Africa's Protection of Personal Information Act, establishes rules for the lawful processing of personal information in South Africa. This blog looks at the purpose of the law, POPIA compliance best practices, and more.As data privacy takes center stage around the world, governing bodies have begun devoting ever more time and attention to defining legal frameworks for working with consumer data safely. South Africa’s Protection of Personal Information Act, or "POPIA," was put forth in 2013 to help keep individuals' personal information from being misused. Chris Brook 3817 2024-09-17T11:35:00-0500 Fortra's Digital Guardian Friday Five: Botnets, Phishing Networks Thwarted, Supporting Federal Agencies and Critical Infrastructure, & More https://www.digitalguardian.com/blog/friday-five-botnets-phishing-networks-thwarted-supporting-federal-agencies-and-critical As the federal government is working to secure critical infrastructure organizations and its own agencies, law enforcement is hard at work taking down large-scale phishing networks and state-sponsored botnets. Get up to speed on these stories and more in this week's Friday Five. Robbie Araiza 3816 2024-09-20T15:07:00-0500 Fortra's Digital Guardian What is Cybersecurity? A Comprehensive Guide on Strategies, Technologies, and Best Practices https://www.digitalguardian.com/blog/what-cybersecurity-comprehensive-guide-strategies-technologies-and-best-practices Cybersecurity protects computers, servers, mobile devices, systems, networks, and data from digital attacks, damage, and unauthorized access. Learn all about cybersecurity in this blog.The Benefits and Challenges of Implementing CybersecurityAs cybersecurity threats and actors have grown more bold and sophisticated, organizations must understand the cybersecurity environment they confront. As a famous slogan goes, this is not your father’s cybersecurity landscape.This article highlights cybersecurity's role, benefits, and challenges in the modern era. Chris Brook 3815 2024-09-25T11:09:00-0500 Fortra's Digital Guardian Integrating Messaging Apps into Your Data Protection Strategy - Blog https://www.digitalguardian.com/blog/integrating-messaging-apps-your-data-protection-strategy In today’s digital age, collaboration tools like Slack and Microsoft Teams have become essential for business communication and teamwork. While these platforms enhance productivity and streamline communication, they also introduce new risks and challenges to data security. At Digital Guardian, we understand the importance of integrating these messaging apps into your data protection strategy. Here’s how our solution can help safeguard your organization’s sensitive information while enabling seamless collaboration. Daniel Binkley 3814 2024-09-25T12:17:00-0500 Fortra's Digital Guardian Understanding Saudi Arabia's NDMO Standards - Blog https://www.digitalguardian.com/blog/understanding-saudi-arabias-ndmo-standards As governments continue to find themselves switching fully to digital records, it's important to ensure there are safeguards in place to secure that data. In the Middle East, the Kingdom of Saudi Arabia’s (KSA’s) National Data Management and Personal Data Protection Standards are designed to do just that, implementing cybersecurity practices that will safeguard public and government-owned data as part of Vision 2030, a government program first outlined by the KSA in 2016. Chris Brook 3813 2024-10-02T11:17:00-0500 Fortra's Digital Guardian Friday Five: Adjusting Cyber Standards, Supply Chain Threats, & More - Blog https://www.digitalguardian.com/blog/friday-five-adjusting-cyber-standards-supply-chain-threats-more As Chinese ATPs and other cybercriminals escalate attacks against U.S. critical infrastructure, changes to cybersecurity standards and practices may be on the way for healthcare organizations and government agencies. Learn all you need to know in this week's Friday Five. Robbie Araiza 3812 2024-09-27T11:56:07-0500 Fortra's Digital Guardian What Is a Secure Web Gateway (SWG)? - Blog https://www.digitalguardian.com/blog/what-secure-web-gateway-swg A Secure Web Gateway (SWG) filters and blocks malicious internet traffic, preventing it from entering an organization's internal network. This is accomplished through a diverse range of security technologies, such as URL filtering, advanced threat defense, data loss prevention, and application control. Chris Brook 3811 2024-09-30T09:46:07-0500 Fortra's Digital Guardian The Importance of Security Service Edge (SSE) For Integrated, Cloud-Delivered Solutions https://www.digitalguardian.com/blog/importance-security-service-edge-sse-integrated-cloud-delivered-solutions With an increasingly broad attack surface to defend, organizations must embrace integrated cloud cybersecurity concepts to fortify their systems spread through different application endpoints. The security service edge provides critical security solutions that allow safe remote access to web, software-as-a-service, and other cloud-based platforms. Chris Brook 2550 2024-09-12T11:33:50-0500 Fortra's Digital Guardian The Benefits and Challenges of Implementing an Extended Detection and Response (XDR) Strategy https://www.digitalguardian.com/blog/benefits-and-challenges-implementing-extended-detection-and-response-xdr-strategy With the massive vectors of cybersecurity attacks available, there is rarely a single silver bullet to address every conceivable cybersecurity threat an organization may face. That's why these days, many organizations are increasingly adopting XDR to effectively protect against a constantly evolving threat landscape. Chris Brook 2551 2024-09-09T08:54:21-0500 Fortra's Digital Guardian Friday Five: Cyber Incident Reporting, Looming Attacks, & More https://www.digitalguardian.com/blog/friday-five-cyber-incident-reporting-looming-attacks-more CISA OFFERS VOLUNTARY CYBER INCIDENT REPORTING PORTAL BY NAVEEN GOUD The Voluntary Cyber Incident Reporting Portal, established by the Cybersecurity and Infrastructure Security Agency (CISA), enables businesses to report cyber-attacks and provides guidance on incident reporting, public communication, and proactive security measures. The portal, part of CISA's services, helps track vulnerabilities, offers updates on fixes, supports law enforcement investigations, and aims to prevent future attacks. Robbie Araiza 2552 2024-09-06T13:37:04-0500 Fortra's Digital Guardian An Overview of Endpoint Detection and Response (EDR) https://www.digitalguardian.com/blog/overview-endpoint-detection-and-response-edr The proliferation of endpoints due to the increasing growth of a remote workforce, mobile devices, and the Internet of Things (IoT) has exposed organizations to a much broader attack surface. As a result, technologies like endpoint detection and response (EDR) systems are designed to evaluate the threats the network perimeter poses to data security respond to them in real-time. Chris Brook 2553 2024-09-03T10:48:43-0500 Fortra's Digital Guardian Friday Five: Hacked ISPs, Major Breaches, Insider Threats, & More https://www.digitalguardian.com/blog/friday-five-hacked-isps-major-breaches-insider-threats-more HACKERS INFECT ISPS WITH MALWARE THAT STEALS CUSTOMERS’ CREDENTIALS BY DAN GOODIN Chinese state-sponsored hackers exploited a zero-day vulnerability in Amazon Web Services' Versa Director, a platform used by ISPs, to install malware and steal customer credentials. The flaw, CVE-2024-39717, involved unsanitized file uploads that allowed attackers to gain administrative control and inject malicious Java files. The attacks, which began in June 2024, targeted U.S. ISPs, bypassing detection by running in memory and using compromised home routers. Robbie Araiza 2554 2024-08-30T11:49:03-0500 Fortra's Digital Guardian Understanding Data Security Tools, their Capabilities, and Why They Are Important https://www.digitalguardian.com/blog/understanding-data-security-tools-their-capabilities-and-why-they-are-important In addition to implementing the right cybersecurity policies, organizations must use the right data security tools to protect customer data, trade secrets, and proprietary information. Data security tools must work collectively to ensure that an organization's sensitive and critical data is safeguarded against a wide array of threats and risks posed by cybercriminals. Chris Brook 2555 2024-08-26T08:00:00-0500 Fortra's Digital Guardian Friday Five: Application Vulnerabilities, Election Infrastructure Security, & More https://www.digitalguardian.com/blog/friday-five-application-vulnerabilities-election-infrastructure-security-more RANSOMWARE RAKES IN RECORD-BREAKING $450 MILLION IN FIRST HALF OF 2024 BY BILL TOULAS In the first half of 2024, ransomware victims paid $459.8 million to cybercriminals, laying a potential course to surpass 2023’s $1.1 billion record by the end of the year. Despite law enforcement disruptions, ransomware attacks have intensified, with gangs demanding higher ransoms from large organizations, including a record $75 million payment, with the median ransom payment surging to $1.5 million by June 2024. Robbie Araiza 2556 2024-08-23T13:28:28-0500 Fortra's Digital Guardian Friday Five: A Breach of Epic Proportions, Ransomware Wins, & More https://www.digitalguardian.com/blog/friday-five-breach-epic-proportions-ransomware-wins-more NATIONALPUBLICDATA.COM HACK EXPOSES A NATION’S DATA BY BRIAN KREBS A massive data breach at NationalPublicData.com, a little-known consumer data broker, exposed the personal information of millions, including Social Security Numbers (SSNs), names, and addresses. The breach, initially disclosed by cybercriminal "USDoD" in April 2024, was later leaked on Breachforums. NationalPublicData.com, linked to retired sheriff's deputy Salvatore Verini Jr., acknowledged the breach and claimed it was caused by a third-party attack. Robbie Araiza 2557 2024-08-16T11:51:28-0500 Fortra's Digital Guardian What Is Data Mining Security? Highlighting its Threats, Opportunities, and Benefits https://www.digitalguardian.com/blog/what-data-mining-security-highlighting-its-threats-opportunities-and-benefits Data mining security refers to the methods and protocols used to secure data during data mining. These techniques help protect data confidentiality and integrity while preventing unauthorized access. Chris Brook 2558 2024-08-12T13:10:26-0500 Fortra's Digital Guardian Friday Five: The Ongoing Ransomware War, New and Emerging Attacks, & More https://www.digitalguardian.com/blog/friday-five-ongoing-ransomware-war-new-and-emerging-attacks-more LOW-DRAMA ‘DARK ANGELS’ REAP RECORD RANSOMS BY BRIAN KREBS The ransomware group Dark Angels recently received a record $75 million ransom payment from a Fortune 50 company, making headlines despite their usually low profile. Operating since 2021, Dark Angels focuses on mass data theft rather than disrupting operations, typically avoiding the ransomware affiliate model and only launching a victim leak site, Dunghill Leak, in April 2023. In this instance, a recently breached pharmaceutical giant is suspected of being the victim of the record ransom payment. Robbie Araiza 2559 2024-08-09T11:48:42-0500 Fortra's Digital Guardian Data Security Policy Template: Tips & Free Download https://www.digitalguardian.com/blog/data-security-policy-template-tips-free-download A data security policy is a set of guidelines and rules an organization establishes to manage and protect its data assets. This policy outlines how the company's data should be handled, stored, accessed, and secured to protect its integrity, confidentiality, and availability. Chris Brook 2560 2024-08-06T09:58:55-0500 Fortra's Digital Guardian Data Privacy Best Practices: Ensure Compliance & Security https://www.digitalguardian.com/blog/data-privacy-best-practices-ensure-compliance-security Organizations must protect their data, depending on its sensitivity. While corporate secrets, intellectual property, and proprietary information are protected for competitive purposes, personal, customer, and employee data are subject to privacy rights and regulations. Chris Brook 2561 2024-07-30T12:47:25-0500 Fortra's Digital Guardian Friday Five: The Wake of the Crowdstrike Debacle, a North Korean Hacker Hired to a Security Firm, & More https://www.digitalguardian.com/blog/friday-five-wake-crowdstrike-debacle-north-korean-hacker-hired-security-firm-more CROWDSTRIKE BLAMES TESTING BUGS FOR SECURITY UPDATE THAT TOOK DOWN 8.5M WINDOWS PCS BY ANDREW CUNNINGHAM CrowdStrike released a preliminary report on a faulty update to its Falcon security software that crashed up to 8.5 million Windows PCs, causing widespread disruption. The issue stemmed from a Content Validator bug that failed to detect problematic data in a Rapid Response Content update. CrowdStrike plans to enhance its testing and deployment processes, including additional validation checks and a staggered deployment strategy. Robbie Araiza 2562 2024-07-26T11:44:40-0500 Fortra's Digital Guardian Friday Five: A Major Microsoft Outage, Spiking Breach Victim Numbers, & More https://www.digitalguardian.com/blog/friday-five-major-microsoft-outage-spiking-breach-victim-numbers-more US DATA BREACH VICTIM NUMBERS SURGE 1170% ANNUALLY BY PHIL MUNCASTER In Q2 2024, the number of US data breach victims surged by over 1000%, despite a 12% decrease in the number of incidents, according to the Identity Theft Resource Center (ITRC). This rise is attributed to a few large breaches, with some larger organizations significantly increasing their reported victim counts. The first half of 2024 reportedly saw 1,571 data compromises, a 14% increase from H1 2023, with victims totaling over 1 billion. Robbie Araiza 2563 2024-07-19T10:31:33-0500 Fortra's Digital Guardian What Is a Data Retention Policy? How It Works & Why You Need It https://www.digitalguardian.com/blog/what-data-retention-policy-how-it-works-why-you-need-it No matter how important a piece of information becomes to your organization, it inevitably goes through the various data lifecycle stages. Therefore, you must have a robust risk management protocol to guide the storage and disposal of sensitive and proprietary information. Chris Brook 2564 2024-07-15T11:27:08-0500 Fortra's Digital Guardian Friday Five: Regulatory Discord, North Korean and Kremlin-Backed Attacks, & More https://www.digitalguardian.com/blog/friday-five-regulatory-discord-north-korean-and-kremlin-backed-attacks-more BIPARTISAN SENATE BILL TAKES AIM AT ‘OVERLY BURDENSOME’ CYBERSECURITY REGS BY MATT BRACKEN The Streamlining Federal Cybersecurity Regulations Act, proposed by Senators Gary Peters and James Lankford, seeks to establish an interagency committee to harmonize the U.S.'s fragmented cybersecurity regulations. The bill mandates the White House’s national cyber director to form this committee, which will identify and update inconsistent or burdensome cyber requirements, set minimum standards, and promote agency reciprocity. Robbie Araiza 2565 2024-07-12T11:48:11-0500 Fortra's Digital Guardian What Is Data Privacy? Top Risks & Best Practices https://www.digitalguardian.com/blog/what-data-privacy-top-risks-best-practices As our online lives and activities grow more entrenched, we increase the dangers exposed to our privacy in the digital landscape. Therefore, the expectation for data privacy has become high among everyday customers, with people desiring to control their digital footprints, online identities, and the data that flows from such activities. Chris Brook 2566 2024-07-09T13:37:11-0500 Fortra's Digital Guardian What Is a Data Spill? How to Prevent and Manage It https://www.digitalguardian.com/blog/what-data-spill-how-prevent-and-manage-it The data breaches we often encounter in the news are typically perpetrated with malicious intent. However, data security is also compromised when data spills occur. Although data spills are accidental, their fallout is still catastrophic to businesses and their customers. What Is a Data Spill? Data spill, or data breach, happens when sensitive information is mistakenly disclosed or transferred to unsecured environments or unauthorized persons. Chris Brook 2567 2024-07-01T10:31:23-0500 Fortra's Digital Guardian Friday Five: CISA’s Own Security Incident, Open-Source Security Worries, & More https://www.digitalguardian.com/blog/friday-five-cisas-own-security-incident-open-source-security-worries-more CISA: MOST CRITICAL OPEN SOURCE PROJECTS NOT USING MEMORY SAFE CODE BY BILL TOULAS The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and other organizations published a report on memory safety in 172 key open-source projects. They found that over half contain memory-unsafe code, with 55% of total lines of code being memory-unsafe, with critical projects like Linux and Tor having high proportions of unsafe code. Robbie Araiza 2568 2024-06-28T11:05:20-0500 Fortra's Digital Guardian Personal Identifiable Information (PII): Tips & Strategies https://www.digitalguardian.com/blog/personal-identifiable-information-pii-tips-strategies As the line between our online and real-world identities continues to blur, the strategies for safeguarding our personal information must constantly evolve. Therefore, your company’s policies and procedures must continuously change in lockstep with the advanced persistent threats cybercriminals device to steal customers' PII. Chris Brook 2569 2024-06-26T09:20:31-0500 Fortra's Digital Guardian Friday Five: New Threats to Global Workforces, Securing AI, & More https://www.digitalguardian.com/blog/friday-five-new-threats-global-workforces-securing-ai-more CRITICAL INFRASTRUCTURE OPERATORS’ RESILIENCE WOULD GET FEDERAL ASSESSMENT UNDER NEW BILL BY MATT BRACKEN The Contingency Plan for Critical Infrastructure Act, introduced by Reps. Dan Crenshaw and Seth Magaziner, would reportedly mandate a report to Congress on the readiness of critical infrastructure sectors to switch to manual operations during a cyberattack. Robbie Araiza 2570 2024-06-21T09:56:58-0500 Fortra's Digital Guardian What Are Design Rights? How to Protect Your Design IP https://www.digitalguardian.com/blog/what-are-design-rights-how-protect-your-design-ip Design rights refer to a type of intellectual property protection that applies to a product’s visual design or appearance. Chris Brook 2571 2024-06-18T10:50:08-0500 Fortra's Digital Guardian Friday Five: Elaborate Vishing, Microsoft's Security Woes, & More https://www.digitalguardian.com/blog/friday-five-elaborate-vishing-microsofts-security-woes-more FEDS SAW MORE CYBERATTACKS BUT BETTER DETECTION LAST YEAR, FISMA REPORT SAYS BY DAVID DIMOLFETTA Federal agencies experienced a nearly 10% increase in cyberattacks in fiscal year 2023, reporting 32,211 incidents to the Cybersecurity and Infrastructure Security Agency (CISA), up from 29,319 the previous year, according to an Office of Management and Budget report. Attrition attacks surged from 197 to 1,147 incidents, and email phishing more than doubled from 3,011 to 6,198 incidents. This rise is partly due to improved detection capabilities, including automation and training. Robbie Araiza 2572 2024-06-14T11:30:49-0500 Fortra's Digital Guardian What Is a Risk Taxonomy? How to Make One for Your Business https://www.digitalguardian.com/blog/what-risk-taxonomy-how-make-one-your-business Risk taxonomy is a system of categorization that allows an organization to identify and classify various types of risks it may face. Chris Brook 2573 2024-06-12T11:09:43-0500 Fortra's Digital Guardian What Is Data Access Control? A Quick Guide https://www.digitalguardian.com/blog/what-data-access-control-quick-guide Data Access Control is a set of policies, procedures, and technologies that regulate who can access data, what they can do with it, and under what circumstances. It aims to ensure that only authorized users have access to the data they need to perform their jobs while protecting sensitive information from unauthorized access, modification, or deletion . Chris Brook 2574 2024-06-11T11:38:47-0500 Fortra's Digital Guardian Friday Five: AI in Cybercrime, the Ongoing Battle Against Ransomware, & More https://www.digitalguardian.com/blog/friday-five-ai-cybercrime-ongoing-battle-against-ransomware-more WHITE HOUSE URGES STREAMLINED CYBER RULES FOLLOWING INDUSTRY FEEDBACK BY DAVID DIMOLFETTA The Biden administration's cyber czar, Harry Coker, calls for an overhaul of cybersecurity regulations following feedback from nearly 90 responses to an August 2023 White House request. Industry feedback highlighted that inconsistent and duplicative requirements divert funds from cybersecurity programs to compliance spending, hindering cyber defense improvements. Robbie Araiza 2575 2024-06-07T11:55:04-0500 Fortra's Digital Guardian