Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

"It's so important that the CISO gets a seat at the table": a Q&A with Trace3's Gina Yacone

A leading voice in cybersecurity, Gina Yacone is a trusted advisor to senior security leaders, guiding them through emerging trends and recommending strategies to strengthen defenses. She was also recently named Cybersecurity Woman Volunteer of the Year 2024. As regional and advisory CISO at the elite technology consultancy Trace3, she also participates in the Trace3 AI Center of Excellence (CoE) Champion Program, keeping her at the forefront of AI and security innovation.

Introducing the Mend AppSec Platform

According to Dimension Market Research, the global Application Security Market size is projected to “reach USD $9.6 billion by 2024 and is further anticipated to reach USD $47.3 billion by 2033 at a CAGR of 19.4%.” However, companies confront extensive barriers when developing reliable application security programs.

A Deep-Dive Into Initial Access Brokers: Trends, Statistics, Tactics and more

Initial Access Brokers (IABs) are threat actors who infiltrate networks, systems, or organizations and sell this unauthorized access to other malicious actors. Instead of executing the entire cyberattack, IABs focus on the initial breach and monetize it by selling access to compromised systems. They assist ransomware operations, particularly RaaS schemes, by streamlining attacks and reducing workload at the start.

Top 10 data governance tools for 2024

While artificial intelligence and big data steal the spotlight, a less glamorous but equally crucial discipline is quietly shaping the future of business: data governance. With European regulators imposing fines of up to 17.29 million pounds for data mismanagement, it’s clear that data governance is not just a compliance checkbox. It’s a strategic investment that can empower your organization with a tangible return on investment.

Verkada Penalized $2.95M by FTC for Security Failures Exposing 150,000 Camera Feeds

In a significant development in the cybersecurity domain, the Federal Trade Commission (FTC) has proposed a $2.95 million penalty against security camera vendor Verkada. The penalty stems from multiple security failures that allowed hackers to access live video feeds from 150,000 internet-connected cameras. These breaches exposed sensitive environments, including women's health clinics, psychiatric hospitals, prisons, and schools, highlighting the severe implications of inadequate security measures.

The Human Factor in Cybersecurity: Behavioral Insights and Mitigation Strategies

Whether it's clicking on a malicious link or being duped by social engineering tactics, people can unintentionally open the door to significant security breaches for organizations of all sizes. These mistakes aren’t inevitable or limited to any one role—they can happen to anyone, from top executives to customer service reps—but they are preventable with the right knowledge and constant vigilance in place.

Trilio: The Perfect Backup Solution for Red Hat OpenStack Services on OpenShift

As infrastructure continues to evolve for scalability, tenancy and efficiency, there is a growing need for solutions that can bridge the gap between mature cloud offerings such as OpenStack and the ease of deployment, flexibility, and elasticity provided Kubernetes. Red Hat OpenStack Services on OpenShift or “RHOSO” offers a compelling solution for organizations looking to achieve this goal.

Identifying Common Open Port Vulnerabilities in Your Network

When intruders want to break into an establishment, they look for an opening. An open port is one of the openings that a hacker or threat actor looks for to access a digital network. That open port may be on a firewall, a server, or any network-connected computing device. Just as a single unlocked door can jeopardize your privacy and grant access to a physical building, a single open port can provide a point for hackers to breach your systems, exposing you to their malicious intents.

The Role of Deception in Securing Active Directory

90% of businesses around the world use Active Directory as their primary Directory Service. It plays an essential role in the identity and access management of large enterprises. In the past few years, attacks on Active Directory have soared. This is because it is a central platform where all the identities and accesses of employees are hosted, making it the keys to your enterprise.

Critical Vulnerabilities in Microsoft macOS Apps Could Lead to Unrestricted Access for Hackers

In a recent cybersecurity development, eight vulnerabilities have been identified in Microsoft applications for macOS. These flaws could potentially allow attackers to gain elevated privileges or access sensitive data by bypassing the operating system’s permissions-based security model. This blog delves into the nature of these vulnerabilities, their potential impact, and the steps that can be taken to mitigate the risks.