Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

SANS report: Securing the shifting landscape of application development

Major shifts in application development are creating new and significant security risks. Continuous integration/continuous delivery (CI/CD) pipelines and technology advances like automation and AI mean the development process is now so complicated and fast-moving that corporations, DevOps directors, and security groups struggle to understand and manage it, let alone defend it from assaults.

How Product Security Helps To Protect Your Data at Egnyte

One of the critical challenges for organizations today is securing their data. Organizations must incur the cost associated with proper design, development, and maintenance of systems and their appropriate safeguarding and monitoring. One way to reduce and optimize these costs is to choose tools that operate in a Software-as-a-Service model. Choosing tools in such a model helps shift some of the responsibilities and costs to the vendor.

EP 49 - Secure Browsing and Session-Based Threats

In this episode of Trust Issues, David welcomes back Shay Nahari, VP of CyberArk Red Team Services, to discuss the topic of secure browsing and session-based threats. They delve into the dangers of cookie theft, the expanding attack surface, and the importance of identity security. Shay explains how cookies sit post-authentication and how attackers can bypass the entire authentication process by stealing them.

Navigating the Deepfake Landscape: Understanding, Detecting, and Preventing Deception

Artificial intelligence (AI) is swiftly reshaping our reality, sparking innovation across diverse domains. Yet, amid this advancement lies a pressing issue: deepfakes. These ultra-authentic synthetic media pieces can alter videos or audio to fabricate instances where individuals seem to say or do things they never actually did.

Avoid Threats and Vulnerabilities with HIPAA Risk Assessment

Nearly 50 million healthcare records were compromised in 2022, highlighting a dire need for proactive data security measures in this rapidly evolving digital landscape. For healthcare entities storing ePHI (Electronic Protected Health Information), a comprehensive HIPAA Risk Assessment is a foundational step towards protecting sensitive data and ensuring compliance. Furthermore, establishing robust Business Associate Agreements (BAAs) is a HIPAA mandate; failure to do so invites substantial penalties.

Ensuring Cyber Security for Your Forex Trading

The foreign exchange market is full of ups and downs, making it exciting but risky. And it's not just the market swings you need to watch out for; cyber threats are a genuine concern, too. As technology gets smarter, so do the risks, but thankfully, the ways to protect ourselves are getting better as well.

Navigating the Digital Transformation in the Insurance Sector

The insurance industry stands at a crossroads, with digital transformation dictating a new direction for traditional practices and operations. As customer expectations evolve and technology advances at an unprecedented pace, insurers are pressed to adapt, redefining their business models and strategies. This adaptation is not merely about adopting new technologies but also about embracing a cultural shift towards innovation, agility, and customer-centricity.

What Biometric Identification Solution is Suitable for National-Scale Projects?

Biometrics identification? It's everywhere right now, even in your pocket or handbag. You use it to unlock your mobile devices, make online purchases, and access secure facilities. Biometrics identification has stretched its benefits and use cases to national-scale projects. Government institutions currently use an automated biometric identification system, abbreviated as ABIS. This system is used for national-scale or large-scale biometric identification. So, what is an automated biometric identification system? What are its use cases in national-scale projects? Read on to learn more.