Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Exploring Cybersecurity Risks in Telemedicine: A New Healthcare Paradigm

The experience of seeing a doctor has transformed dramatically, thanks in part to the emergence of telemedicine. This digital evolution promises convenience and accessibility but brings with it a host of cybersecurity risks that were unimaginable up until a few years ago. The unique cybersecurity challenges facing telemedicine today underscore the importance of adopting stringent security measures to protect the sanctity of this vital service.

Credit Card vs Debit Card: Which Is Safer?

Identity theft and card fraud are the main concerns associated with using debit and credit cards. Like any financial instrument, credit and debit cards are susceptible to certain security threats that can compromise cardholders' information and lead to credit card fraud or debit card fraud. Common examples of such financial security threats include card theft, phishing, skimming, malware, card cloning, vishing, weak passwords/PINs, and social engineering.

Outpost24 Enhances Attack Surface Management with Manual Rescanning

Philadelphia, PA, 22nd April – Outpost24, a leading provider of cyber threat exposure management solutions, is pleased to announce the addition of manual asset rescans to its External Attack Surface Management (EASM) platform. This enhancement enables EASM customers to re-check the status of recently updated assets, providing flexibility around asset management tasks outside of automated and continuous scanning.

Wallarm's Open Source API Firewall debuts at Blackhat Asia 2024 - Introduces Key New Features & Functionalities

Wallarm introduced its ongoing Open Source API Firewall project to the world at the recently concluded Blackhat Asia 2024 conference in Singapore. The open-source API Firewall by Wallarm is a free, lightweight API Firewall designed to protect REST and GraphQL API endpoints across cloud-native environments using API schema validation. By relying on a positive security model, our API Firewall only allows calls that match a predefined API specification while rejecting everything else.

Cloud Security Regulations in Financial Services

As the financial sector continues to adopt cloud technology, regulatory frameworks such as the updated NIS2 Directive and the Digital Operational Resilience Act (DORA) are shaping the cybersecurity landscape. Every second counts in such a complex environment: attackers can move quickly in the cloud, so defenders must change their strategies and tools to keep up. The financial sector has always been a prime target for cyber attacks, with the average breach costing almost 6 million US dollars.

Microsoft Copilot for Security - Use Cases for Data Governance Teams Working with Auditors and Consultants

This is the final installment of our Microsoft Copilot for Security blog series. Over the past eight weeks, our weekly blog helped various cyber security groups see possible use cases for Microsoft Copilot for Security. This final blog explores how AI and Microsoft Copilot for Security can assist external auditors and consultants in interacting with Microsoft Purview. Azure Policy and Microsoft Purview work together to ensure the proper governance and compliance of data assets.

Here's what caused the Sisense data breach-and 5 tips for preventing it

From Uber in 2016 to Okta in 2023 to Sisense in 2024, it’s evident that there’s a pattern behind the tech industry’s most devastating breaches: Data sprawl. Let’s dive into how data sprawl played a part in last week’s Sisense breach, as well as how security teams can be proactive in defending against similar attacks.

What is the Use of LLMs in Generative AI?

Generative AI is a rapidly maturing field that has captured the imagination of researchers, developers, and industries alike. Generative AI refers to artificial intelligence systems adept at concocting new and original content, such as text, images, audio, or code, based on the patterns and relationships learned from training data. This revolutionary technology can transform various sectors, from creative industries to scientific research and product development.

Locking Down Security: Disable WDigest Authentication

WDigest Authentication is a method used in Windows operating systems for verifying user credentials during authentication. It’s a way for computers to prove their identity to servers by storing a copy of the user’s plaintext password in memory. It uses Hypertext Transfer Protocol (HTTP) along with Simple Authentication Security Layer (SASL) exchanges for authentication purposes. The name “WDigest” comes from its function and purpose within the Windows operating system.

What is HashiCorp Vault and How Does it Work?

With technological advancements, organizations are moving to the public cloud, which has resulted in a major concern: data security. Traditional methods of managing secrets and sensitive information are proving inadequate, especially when there is a high volume of private data. Here comes the need for HashiCorp Vault: a solution that offers a centralized and robust system to safeguard sensitive information. In this blog, we will explore HashiCorp Vault’s purpose, benefits, and use cases.