Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How Did Plex Get Hacked in 2022?

‍Plex was breached by an unauthorized third-party gained who gained access to a proprietary database. The specific attack vector that facilitated the breach hasn’t been disclosed. According to Plex, cybercriminals “tunneled” their way through sophisticated cybersecurity mechanisms to gain access to sensitive customer data.

Top Myths About Password Security

A study by Google reveals that about 75% of Americans feel frustrated about passwords, so it’s easy to understand why people would adhere to common “guides” about password security. You need to be careful about misinformation and what counts as good password hygiene. In this blog, we discuss nine popular myths and misconceptions about password security, the right approach to password security and the importance of deploying password managers.

Lookout and Fortra Partner to Secure Sensitive Data Across the Enterprise

The first steps for any organization in creating a data security strategy are accurately identifying all of their sensitive information and securing that data from unauthorized access, regardless of where it resides. This is why I’m excited to announce the integration of Titus and Boldon James, leading data classification systems from Fortra (formerly HelpSystems), with the Lookout security service edge (SSE) solution.

6 ways you can protect yourself from fraud this Christmas 2022

Since 2018, identity fraud rates have risen by up to 15% year on year throughout November and December, as criminals try to take advantage of an increase in online transactions, lowering businesses’ capacity to investigate suspected fraud and access credit using stolen personal information. The issue grows more acute around the holiday season, with incidents increasing over the previous four years to attempt to obtain credit using stolen personal information.

Important Takeaways from the Orange and Netskope Partnership

Recently, Orange Business Services, Orange Cyberdefense, and Netskope announced a global partnership to deliver a fully integrated secure access service edge (SASE) solution on the Orange network. The partnership includes the deployment of Netskope data planes inside the Orange network to provide a full stack of security service edge (SSE) services that will be available from both the New Edge network and Orange’s world-class connectivity services.

Why Threat Intelligence Matters To Your Organization?

Technological advancements have revolutionized the world’s cultural and economic institutions in almost every aspect. Unfortunately, they have also brought risks in the form of cyber threats. While there are various ways to mitigate such threats, paying importance to threat intelligence can make a difference to your organization.

The Increasing Threat Posed by Hacktivist Attacks: An Analysis of Targeted Organizations, Devices and TTPs

This year has seen an enormous increase in the number and claimed impact of hacktivist attacks on critical infrastructure and enterprises operating in critical services. Many attacks target unmanaged devices such as Internet of Things (IoT) and operational technology (OT) equipment. Attacks are motivated by geopolitical or social developments across the globe, with the goal of spreading a message or causing physical disruption.

What Is Fine-Grained Access Control?

A data and security breach often leads to fines and the loss of customer trust for organizations. An IBM report estimates that a data breach on average costs $4.35 million in 2022, a 2.6% increase from the previous year. The increased concern with data and security breaches — along with the need to address more complicated use cases — reinforces the call for more granular methods of access control.

3 tips for effective developer security training

“This is the golden era of application security,” says Founder of Manicode Security and secure coding trainer Jim Manico on episode 26 of The Secure Developer podcast. Ten years ago, Manico says, security training was “a quirky thing to do — something to do on the side.” Now, assessment tools are mature, good literature on assessment makes knowledge more accessible, and a wide range of intelligent people are building secure applications.