next gen security
How to Apply CIS Benchmarks to Strengthen Cybersecurity Posture
A guide on how to apply CIS Benchmarks to your organization’s cybersecurity policies One of the most effective ways to enhance your cybersecurity posture is by implementing the Center for Internet Security ...
The Role of Microsegmentation in Kubernetes Environments
Rafael Parsacala | | advice, Best Practices, microsegmentation, next gen security, security, Security Research
Optimizing Kubernetes security and efficiency of through granular control Kubernetes stands out as a powerful and versatile platform amongst application systems, allowing organizations to efficiently manage containers. However, enterprises face security challenges ...
What are CIS Benchmarks?
What are CIS Benchmarks, their practical benefits, and the process on implementing them in your organization’s security policy? In cybersecurity, the Center for Internet Security (CIS) Benchmarks stand as a cornerstone for ...
Hospitality Cybersecurity and its Challenges
What are the cybersecurity challenges presented by growing innovations in the hospitality industry, and how can we meet to face them? In the dynamic landscape of cybersecurity, the hospitality industry is prime ...
Crafting a Resilient Network Security Strategy
Rafael Parsacala | | advice, Cybersecurity, network segmentation, next gen security, Security Research
How can modern security teams devise a dynamic network security strategy for a threat landscape that is constantly evolving? In today’s digitally interconnected landscape, protecting your organization’s network should be a top ...
The Evolution of Cybersecurity Liability for the C-Suite
Nik Hewitt | | advice, analysis, Best Practices, Cybersecurity, lateral movement, microsegmentation, network segmentation, next gen security, Security Research, zero trust
The rapid evolution of cybersecurity liability for security chiefs, management, and information security professionals Cybersecurity liability is changing rapidly and has become a boardroom (and personal) matter in 2024, with increasing threats ...
The Persistent Threat of Path Traversal Vulnerabilities in Software Development
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, lateral movement, microsegmentation, next gen security, security, Security Research, vulnerability, zero trust
Path traversal vulnerabilities, or directory traversal, are now subject to a government advisory for obligatory consideration We live in an environment where digital infrastructure is increasingly fundamental to business operations across all ...
Should We Pay the Ransomware Ransome?
Nik Hewitt | | advice, Best Practices, Cybersecurity, next gen security, Ransomware, Security Research
To pay or not to pay the ransomware ransom: Should we pay to unlock our data, or is there an alternative? The decision as to whether or not we should pay ransomware ...
CVE-2024-27322 Vulnerability Found in R Programming Language
Nik Hewitt | | advice, Best Practices, Cybersecurity, next gen security, security, Uncategorized, vulnerability
A critical vulnerability (CVE-2024-27322) in R programming language exposes systems to arbitrary code execution : OFFICIAL CVE-2024-27322 PATCHING INFORMATION : A recent discovery has unearthed CVE-2024-27322, a significant vulnerability within the R ...
Preparing for Holiday Cyberattacks
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, next gen security, Phishing, security, Security Research, vulnerability, zero-day
How can security teams be ready for holiday cyberattacks and a seasonal peak in cybercrime? Holiday cyberattacks are on the rise. The vacation season, be it Christmas, Hanukkah, Easter, St. Patrick’s Day, ...