Blog
NIST Cybersecurity Framework 2.0 – What’s New?
In the rapidly evolving world of cybersecurity, staying ahead of emerging threats requires vigilance and a framework that evolves with the times. The recent unveiling of the NIST Cybersecurity Framework 2.0 is
What is Data Classification?
In today’s data-driven world, managing and protecting information has become a critical challenge for modern organizations. The explosion of data, much of it unstructured and sprawling across diverse digital landscapes, has made
How to Reduce Alert Fatigue
What if your security tools are the biggest threat to your security posture? As ironic as that would be, that’s closer to the truth for many security teams than they would like
Four Most Common Cyberattacks
The threat landscape is evolving rapidly, presenting new challenges that demand constant vigilance. Cyberattacks and threats are ubiquitous in our online existence. Adversaries employ increasingly sophisticated methods to exploit vulnerabilities. From the
What is the MITRE ATT&CK Framework?
You can’t spend too long working in cybersecurity without hearing about the MITRE ATT&CK framework. First released in 2013, made freely available to the public in 2015, and biannually updated since then,
Multifactor Authentication: What is it? How to use it?
Ensuring seccuring access to accounts, networks and devices has never been more critical. Threat actors are increasingly innovative and sophisticated, getting into places they don’t belong. Cybersecurity professionals and leaders have long
Best Practices for a Secure Password
Understanding and implementing best practices for password security is essential. Safeguarding sensitive information demands a keen understanding of the vulnerabilities associated with passwords. Strong passwords serve as the first line of defense
Tackling the Business Risks of AI
Are we unknowingly opening Pandora’s box with AI (Artificial Intelligence) in our businesses? Recently, Atlantic Data Security teamed up with Fortra for an insightful webinar exploring this very question. What are the immediate
Over 178,000 SonicWall Firewalls are publicly exploitable to years old bug
Yesterday, Bishop Fox released research where they found that at least 178,000 SonicWall firewalls devices were vulnerable to at least one of two critical exploits that had been discovered over a year ago.
Content Zero Trust
As malware becomes increasingly sophisticated and harder to detect, the need for robust cybersecurity has never been more critical. Zero Trust has emerged as a powerful model in this landscape, primarily focusing
NIST Cybersecurity Framework 2.0 – What’s New?
In the rapidly evolving world of cybersecurity, staying ahead of emerging threats requires vigilance and a framework that evolves with the times. The recent unveiling of the NIST Cybersecurity Framework 2.0 is
What is Data Classification?
In today’s data-driven world, managing and protecting information has become a critical challenge for modern organizations. The explosion of data, much of it unstructured and sprawling across diverse digital landscapes, has made
How to Reduce Alert Fatigue
What if your security tools are the biggest threat to your security posture? As ironic as that would be, that’s closer to the truth for many security teams than they would like
Four Most Common Cyberattacks
The threat landscape is evolving rapidly, presenting new challenges that demand constant vigilance. Cyberattacks and threats are ubiquitous in our online existence. Adversaries employ increasingly sophisticated methods to exploit vulnerabilities. From the
What is the MITRE ATT&CK Framework?
You can’t spend too long working in cybersecurity without hearing about the MITRE ATT&CK framework. First released in 2013, made freely available to the public in 2015, and biannually updated since then,