Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How To Stop MFA Fatigue Attacks

As organizations continue to digitize and passwords proliferate across systems, applications, and even assets, identity and access management (IAM) has become a pillar of cybersecurity. One component of IAM has become ubiquitous with access security: multi-factor authentication (MFA). MFA is an access control technique that adds a layer of security to user logins and access by making the user verify their identity.

Modern data security: why the convergence of DLP and IRM is more effective than the sum of its parts

In the past decade, organizations seeking to protect sensitive data from negligent or malicious insiders faced two choices: invest in a Data Loss Prevention (DLP) product or an Insider Risk Management (IRM) product. These solutions addressed the same problem from different angles. DLP products focused on analyzing data content to control its movement, while IRM products monitored user behavior for risky actions.

Latest AT&T Data Breach Highlights the Need to Double Down on Cybersecurity Basics

AT&T reported on July 12 that an internal investigation had revealed that the telecommunication provider had been victimized by a third-party breach,resulting in the compromise of records of calls and texts of nearly all of AT&T’s cellular customers. An AT&T spokesperson confirmed to a news source that the breach resulted from of the data stolen from cloud storage firm Snowflake.

Data Scraping Legal Issues: Exploring hiQ vs LinkedIn Case

The high-profile case of hiQ Labs Inc vs LinkedIn Corporation (that took place in the US) shed light on the much-discussed data scraping legal issues. We know you don’t want to get lost in legalese. So, we have prepared an easy-to-read summary of the most important points of this decision. The court sided with the scraper and established that scraping public data is not a violation of the CFAA (Computer Fraud and Abuse Act).

FDA's cybersecurity requirements for medical devices and when to comply with them

The United States Food and Drug Administration (FDA) is a federal agency within the Department of Health and Human Services. The FDA is responsible for protecting and promoting public health through the control and supervision of medications, vaccines, biopharmaceuticals, medical devices, and other types of products. To ensure the safety and security of medical devices, the FDA supports a variety of standards and guidelines that medical device manufacturers are highly recommended to follow.

The Role of Encryption in Protecting LLM Data Pipelines

Encryption is a fundamental procedure in cybersecurity that transforms data into a coded format, making it inaccessible to unauthorized users. It has evolved significantly from simple ciphers in ancient times to complex algorithms like AES (Advanced Encryption Standard) and RSA (Rivest-Shamir-Adleman), which are used today. Encryption ensures data confidentiality, integrity, and authenticity, which is crucial in protecting sensitive information across various domains.

Cloud Threats Memo: CloudSorcerer, a Recently Discovered APT, is Exploiting Multiple Legitimate Cloud Services

A recently discovered advanced persistent threat (APT) provides a particularly meaningful example of how multiple cloud services can be combined inside the same attack chain to add layers of sophistication and evasion. CloudSorcerer is the name that researchers at Kaspersky have coined to describe an advanced threat actor targeting Russian government entities.