What Is the General Data Protection Regulation (GDPR)?
The General Data Protection Regulation (GDPR) is a legal framework that sets guidelines for the collection and processing of personal information from individuals who live in the European Union (EU). Since the Regulation applies regardless of where...
Falcon Community & Blog
Cyber Security and Risk Management
25
Sep
Cyber security risk management is a practice that every organization must look after in order to protect their valuable company assets. The risk management is also advancing the cybersecurity sector to prevent cyber attacks on the company systems that can compromise valuable company assets. Therefore, the companies are...
What is User and Entity Behavior Analytics? A Definition of UEBA, Benefits, How It Works, and More
24
Sep
Learn about user and entity behavior analytics (UEBA) in Data Protection 101, our series on the fundamentals of information security.
WHAT IS UEBA?
Hackers can break into firewalls, send you e-mails with malicious and infected attachments, or even bribe an employee...
Advanced Persistent Threat (APT)
24
Sep
Who's who of cyber threat actorsFalcon Shield Security pays special attention to advanced persistent threats (APT) groups that receive direction and support from an established nation state.
Like other attackers, APT groups try to steal data, disrupt operations or destroy infrastructure. Unlike most cyber criminals,...
Top 5 most notorious cyberattacks
24
Sep
A cyberattack is a malicious and deliberate attempt by an individual or organization to breach the information system of another individual or organization. Usually, the attacker seeks some type of benefit from disrupting the victim’s network.
How often do...
What is an SLA? Best practices for service-level agreements
24
Sep
A service-level agreement (SLA) defines the level of service you expect from a vendor, laying out the metrics by which service is measured, as well as remedies or penalties should agreed-on service levels not be achieved. It is a critical component of any technology vendor contract.
Red Teaming assessment
24
Sep
Red Team Kuwait Cyber Security
A red team assessment is a goal-based adversarial activity that requires a big-picture, holistic view of the organization from the perspective of an adversary. This assessment process is designed to meet the needs of complex organizations handling a variety...
Penetration Testing to Identify & Fix Vulnerabilities
24
Sep
Penetration testing, also known as pen testing, aims to identify an organization’s security vulnerabilities through a systematic testing process. A penetration test may focus on your networks, applications, physical facilities, human assets and more.
Why Does My Business Need Penetration Testing?
Cyber-attacks...
WAF vs IPS: What’s The Difference?
24
Sep
To cut the long story short, both the WAF and IPS are security solutions that aim to protect the connection between a client and a server (web application). Both, IPS and WAFs, monitor traffic to and from web applications or servers. The main difference is that an IPS (Intrusion...