Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Keeper Announces Passkey Support for iOS and Android

Keeper Security is excited to announce that it now supports passkeys for mobile platforms on iOS and Android. This update extends passkey management functionality in the Keeper Vault beyond the Keeper browser extension support for Chrome, Firefox, Edge, Brave and Safari announced in June 2023. Passkeys have seen rapid adoption since their introduction in 2022 and Keeper is proud to enable their use across devices, bringing users a more secure and streamlined authentication experience.

How To Prevent Insider Threats

According to Verizon’s 2023 Data Breach Investigations Report, 19% of the threats organizations face are internal. When organizations don’t take the necessary steps to prevent internal misuse of credentials and human errors, their chances of suffering an insider threat are greater. A few ways organizations can prevent insider threats are by using threat modeling, implementing the principle of least privilege, using strict access controls and deleting accounts when employees leave.

The Average Malicious Website Exists for Less Than 10 Minutes

A new Chrome update brings to light Google findings about malicious websites that have serious implications on detecting malicious links, spoofed brands and the use of legitimate web services. This month, Google released a new feature to Google Safe Browsing, a feature that is used by over 5 million devices today and better protects Chrome browser users.

How to Avoid Online Tax Day Scams: Tips to protect your finances and data

As Tax Day in the U.S. looms on the horizon, so too does the risk of falling victim to online scams. In 1986, the first year that e-filing was available, five people filed their returns electronically. Since then, the popularity of e-filing has increased so much that 92% of individual tax returns are now e-filed. As online tax filing and payment have become more popular, though, scams targeting unsuspecting taxpayers have as well.

Evaluating Your Security Posture: Security Assessment Basics

This is Part 4 in my ongoing project to cover 30 cybersecurity topics in 30 weekly blog posts. The full series can be found here. Performing Security Assessments is one component of security operations that every organization does, or at least should do. However, deciding what type of assessment to conduct can be challenging. After all, there’s a long list of assessments that can be useful in providing insights into your security architecture and operational performance.

What is anti-tampering protection and how can it help a company's cybersecurity?

Cybercriminals are increasingly using new evasion strategies in their attacks in order to disable or alter company security controls. This year, there has been a surge in the use of hunter-killer malware that seeks to identify and eliminate enterprise defenses such as firewalls, antivirus, and next-generation EDR technologies. A recent report reveals a massive 333% increase in this type of malware.

The Looming Cyber Threat in Real Estate

In our interconnected world, the real estate industry has embraced technology to revolutionize its operations, enhance customer experiences, and streamline business processes. Yet, while this technological evolution has brought immense benefits to the property sector, it has also attracted the attention of nefarious actors keen on exploiting vulnerabilities.

Third-Party Risk: How MDR Offers Relief as Security Threats Abound

While third-party products and services are crucial to everyday business operations for almost any company, they also present significant security concerns, as high-profile attacks including SolarWinds and MOVEit laid bare. Trustwave research shows the attacks vary by industry but also makes clear the best defense is the stringent application of the latest security measures, including penetration tests, vulnerability scans, and managed detection and response (MDR) services.

Jit Announces Open Source License Detection and Tracking

Earlier this year Jit announced Software Bill of Materials, which catalogs every open source component in your codebase – making it easy to understand if you are using an open source component that is impacted by a newly disclosed security vulnerability. With our new release of Open Source License Detection, you’ll also be able to detect the associated license of each open source component in your codebase.