Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

February 2024

Cloud Security Best Practices

In the swiftly evolving landscape of technology, cloud computing stands as a pivotal innovation, reshaping how we store, access, and manage data across the digital expanse. This paradigm shift towards cloud services offers unparalleled efficiency and flexibility, transforming the very foundation of our digital interactions. However, this transition also introduces complex security challenges that demand a nuanced and proactive approach to safeguard sensitive information against cyber threats.

Network Change Management: Best Practices for 2024

Network Change Management (NCM) is the process of planning, testing, and approving changes to a network infrastructure. The goal is to minimize network disruptions by following standardized procedures for controlled network changes. NCM, or network configuration and change management (NCCM), is all about staying connected and keeping things in check. When done the right way, it lets IT teams seamlessly roll out and track change requests, and boost the network’s overall performance and safety.

AI Predictions Are Fueling Greater Cyber Up-Skilling Needs

It’s a Sunday morning and things are pretty quiet around the Fusilero household, which is especially noticeable now that the chaos of the holiday season has passed and the kids are back at school. So, I’m catching up on my reading and research – starting with Splunk Predictions 2024.

AWS IAM Best Practices

In today’s interconnected digital landscape, robust IAM (Identity and Access Management) practices are critical pillars of an organization’s cybersecurity strategy. IAM serves as the fortress guarding sensitive data, applications, and systems from unauthorized access or breaches. Implementing top-tier IAM practices ensures not only data protection but also compliance adherence and streamlined user access.

Child Identity Theft: What It Is and How To Protect Your Child

Child identity theft occurs when someone uses a minor’s personal information to get loans, open credit cards, steal benefits or secure employment– all under a child’s name. One in 50 children in the U.S. are victims of child identity theft yearly, making it crucial for parents to take steps to protect their children from identity theft. Continue reading to learn more about child identity theft and the steps you can take to protect your child.

Volt Typhoon: SafeBreach Coverage for US-CERT Alert (AA24-038A)

On February 7th, the Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and Federal Bureau of Investigation (FBI) issued an urgent advisory to warn about the possibility of People’s Republic of China (PRC)-affiliated threat actors seeking to execute disruptive or destructive attacks by positioning themselves on IT networks belonging to critical infrastructure entities.

APT29's Attack on Microsoft: Tracking Cozy Bear's Footprints

A new and concerning chapter has unfolded in these troubled times of geopolitical chaos. The Cozy Bear threat actor has caused significant breaches targeting Microsoft and HPE, and more are likely to come. These recent events have sent shockwaves throughout the tech community, and for good reason. As we continue to uncover the fallout from these breaches, it has become apparent that the magnitude of the incident is more significant than we first realized.

Surge in deepfake "Face Swap" attacks puts remote identity verification at risk

New research shows a 704% increase in deepfake "face swap" attacks from the first to the second half of 2023. A report from biometric firm iProov warns that "face-swapping" fraudsters are increasingly using off-the-shelf tools to create manipulated images and videos.

Maximize Your Productivity On-the-Go: Elevate Efficiency with Egnyte Mobile App

Today’s business world is more interconnected than ever. Communication gaps between teams, limited access to crucial data, and the inability to adapt swiftly to market shifts become pain points that slow down progress and hinder critical business decision-making. The Egnyte Mobile App is designed to address communication and collaboration challenges on-the-go.