Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Weekly Cybersecurity Recap August 18

Financial institutions and state government agencies were the main targets of hackers this week. Major organizations like Bank of America and Hospitality Staffing Solutions were hit hard resulting in huge data losses for citizens, and the states of Pennsylvania, Vermont, and Tennessee each experienced major data losses in their regulatory bodies or programs. Learn more about each of these serious data breaches and find out if your information is safe.

Prioritizing cyber resilience in response to a potential ransom payment ban

Ransomware attacks do not simply start and end with a locked computer screen and a ransom note. They unravel as intricate narratives, leaving a trail of financial wreckage, operational interruptions, and reputational damage in their wake. These attacks bear significant costs. In 2022, the average cost of a ransomware attack was a whopping $4.54 million, per IBM Security and the Ponemon Institute. And that does not include the actual ransom payment itself.

Impact of the New SEC Cyber Incident Reporting Rules on the C-Suite and Beyond

We recently hosted a compact and very engaging panel discussion about the new SEC Cyber Incident Reporting Rules due to come into effect later this year. We were fortunate to be joined by two well-known experts: In the post, we will *not* rehash what was said in the panel discussion. If you did not get to attend the live session, we invite you watch it on-demand – it’s 30 minutes well spent!

Mastering the Art of Trip Planning: A Comprehensive Guide

Planning a trip can be an exhilarating adventure that sets the stage for unforgettable experiences. Whether you're dreaming of exploring the pristine beaches of Bali, immersing yourself in the vibrant culture of Japan, or discovering the hidden gems of a random country, careful planning is the foundation of a successful journey. In this comprehensive guide, we will take you through the essential steps to plan your trip effectively, ensuring a seamless and enriching travel experience.

Major Supply Chain Cybersecurity Concerns and 7 Best Practices to Address Them

In today’s complex and interdependent world, it’s incredibly difficult to deliver a product or service without a supply chain. But this dependency creates additional risks – from reputational losses to major business disruptions. And with 62% of organizations being impacted by supply chain cyberattacks in 2021, mitigating risks created by third parties is extremely important.

9 Steps to Protect Against the Next MOVEit/MFT Attack

By now, the facts of the recent MOVEit breach are well known (although the victim total keeps climbing), but it never hurts to be reminded that these attacks do not take place in a vacuum and threat actors are more than happy to repeatedly use the same tactics if their targets remain vulnerable. Trustwave SpiderLabs, has tracked and documented these events explaining how threat actors were found to be exploiting three vulnerabilities, including a zero-day, (CVE-2023-34362, CVE-2023-35036.

11K Bank of America Customers Lose Data to Breach

Ernst and Young is one of the leading consulting companies that helps with strategic and transactional taxes. The company offers excellent services to other major companies and handles a large amount of financial and personal data for all the customers impacted by them. This organization works with major clients like Bank of America, which is now more than 11,000 Bank of America customers were exposed in a recent data breach involving this company.

The New Network Dictionary: AvidThink Explains SASE, SD-WAN, SSE, ZTNA, MCN, and NaaS

The enterprise networking and security market has seen no end to terms and acronyms. SASE, of course, is chief among them, but let us not forget SD-WAN, SSE, ZTNA, and Multi-Cloud Networking (MCN). Then we get into specific capabilities like CASB, DLP, SWG, RBI, FWaaS, and micro-segmentation. This alphabet soup of jargon can confuse even the most diligent and capable CISOs and CIOs, especially when vendors continually redefine and reclassify each category to fit their needs.