The HealthEquity Data Breach: Key Takeaways

The HealthEquity Data Breach: Key Takeaways

| | cybercrime, Podcast
In a recent podcast interview with Cybercrime Magazine's host, David Braue, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, Scott Schober discusses the potential repercussions of the HealthEquity data breach. The podcast can be listened to in its entirety below.  ... Read More
5 Things to Know About GDPR Compliance

5 Things to Know About GDPR Compliance

Navigating the data protection landscape is more critical than ever, and the General Data Protection Regulation (GDPR) stands at the forefront of this endeavor. From hefty fines to mandatory breach notifications, understanding GDPR compliance is crucial for businesses operating in or interacting with the EU. In this article, we'll explore ... Read More
4 Key Features to Look for in Your PCI Software

4 Key Features to Look for in Your PCI Software

So, you’re looking for PCI compliance software to help you comply with regulatory statutes. While there are many options, it is essential to note not all are created equal. Better yet, one software could be a better fit than another based on your business’s needs. However, as the hacking world ... Read More
The Snowflake Data Breach

The Snowflake Data Breach

| | cybercrime, Podcast
In a recent podcast interview with Cybercrime Magazine's host, David Braue, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, Scott Schober discusses the Snowflake data breach, including what it means for the affected individuals and more. The podcast can be listened to in its entirety below ... Read More
Is Open Source File Integrity Monitoring Too Risky?

Is Open Source File Integrity Monitoring Too Risky?

IT pros understand that not all open-source products are created equal. Some of the most beloved tools for business and personal computing, including Firefox, WordPress, and Apache, are the result of successful, long-term open-source (OS) projects. However, when it comes to protecting your organization against information security threats, how do ... Read More
File Integrity Monitoring vs. File Activity Monitoring: Which is Best?

File Integrity Monitoring vs. File Activity Monitoring: Which is Best?

2024 has already been a tumultuous year for information security. Verizon's 2024 Data Breach Investigations Report revealed some shocking statistics about criminal activity and attacks involving the exploitation of vulnerabilities: They have almost tripled (by 180%) since 2023. Network monitoring software can be among the most effective tools for discovering ... Read More
JP Morgan Data Breach: What It Means for the 451,000 Victims

JP Morgan Data Breach: What It Means for the 451,000 Victims

| | Podcast
In a recent podcast interview with Cybercrime Magazine's Host, Heather Engel, Scott Schober, Cyber Expert, Author, and CEO of Berkeley Varitronics Systems, discusses the JP Morgan data breach, including what it means for the over 400,000 affected individuals and more. The podcast can be listened to in its entirety below ... Read More
Can File Integrity Monitoring Catch Internal Threats?

Can File Integrity Monitoring Catch Internal Threats?

One of your greatest information security risks is likely your employees. Data from Verizon's 2024 Data Breach Investigations Report (DBIR) indicates that 76% of breaches involved the human element, and 68% of which were the result of human error ... Read More
Identifying Suspicious Network Changes: 8 Red Flags to Watch For

Identifying Suspicious Network Changes: 8 Red Flags to Watch For

It takes most organizations six months or longer to detect and contain a data breach. Early detection is critical to ensuring an incident doesn't become a full-scale breach. Real-time monitoring is essential for the "rapid detection and response" necessary for both regulatory compliance and adequate protection ... Read More
7 File Integrity Monitoring Best Practices

7 File Integrity Monitoring Best Practices

When used properly, file integrity monitoring (FIM) is a crucial tool in preventing the compromise of sensitive information, such as cardholder data. While it’s clear using a file integrity monitoring solution is a must for organizations big and small, we've noticed several important concepts are often improperly implemented, misunderstood, or ... Read More

Application Security Check Up