Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Badge Life: The CISO Team Takes on DEF CON

Earlier this month, a group of our intrepid pen testers from our Readiness & Resilience team at CISO Global ventured into the heart of the hacking world at DEFCON 32 in Las Vegas. This annual pilgrimage to the mecca of cybersecurity (and more importantly, hacking) is more than just a conference – it’s a hands-on deep dive into the cutting edge of hacking techniques and defensive strategies.

Block Microsoft accounts : When to block and when not

The block Microsoft accounts security setting in Windows is designed to restrict or disable the use of Microsoft accounts on a device or network. This setting can be important for companies looking to have a higher security posture through the use of local accounts only. A Microsoft account is an account created through Microsoft that enables access to a variety of Microsoft services and products, all with a single set of credentials.

Streamlining Legal Workflows with NotatePDF

In the fast-paced world of legal practice, managing cases, documents, and communication is a constant challenge. Legal professionals must juggle numerous tasks, from drafting and reviewing documents to coordinating with clients and colleagues. The sheer volume of information and the need for accuracy and timeliness often lead to inefficiencies, errors, and missed deadlines. These challenges are further compounded by the demand for secure handling of sensitive data and compliance with strict regulations.

ThreatQuotient Launches ThreatQ Platform Availability in AWS Marketplace

ThreatQuotient announces that its leading Threat Intelligence Platform (TIP) is now available in AWS Marketplace, a digital catalog with thousands of software listings from independent software vendors that make it easy to find, test, buy, and deploy software that runs on Amazon Web Services (AWS).

Here's How Phishing Messages Break Through Email Filters

Phishing is an email-borne malicious technique aimed at learning the sensitive credentials of users or spreading malware. This practice has been on the list of the top cyber threats to individuals and businesses for years. According to the latest Phishing Activity Trends Report by APWG, the total number of phishing attacks identified in Q1 2024 exceeded 963,000.

More Carrots and Fewer Sticks

As I sit in the 2024 Seattle Convene conference this week and listen to speaker after speaker talk about their successful security awareness training programs, one thing is perfectly clear. They all prefer carrots and fewer sticks. A question human risk managers frequently ask me is what role negative consequences should play in a successful security awareness training program?

Understanding Data Exfiltration Prevention

In an economy where securing data can mean the difference between success and failure, implementing proven data exfiltration prevention strategies is more critical than ever. According to a study conducted by IBM, a data breach can cost global organizations an average of nearly $5 million per incident. In addition to the financial ramifications, data theft can lead to lower customer trust, a loss of future revenue, and even potential lawsuits.

Protecting Patient Safety: Trustwave's Role in Healthcare Cybersecurity

The healthcare industry's digital transformation has brought unprecedented advancements in patient care. However, it has also introduced new vulnerabilities that put sensitive patient data at risk. Cybersecurity is no longer an option but a critical component of delivering safe and effective care. Threat actors have no compunction about taking advantage of this increased threat surface.

"Better context in a world that's changing quickly": Leading CISOs discuss AI's role in SecOps

Earlier this month, I was thrilled to join forces with the team at Dark Reading for a webinar on the future of AI in security operations. Titled CISO Perspectives: How to make AI an accelerator, not a blocker, the webinar allowed me to take a deep dive into the future role of AI in security with some of the most knowledgeable CISOs on the subject, Mandy Andress of Elastic and Matt Hillary of Drata.