Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Your Security Guide to Insider Threat Protection: 10 Best Practices to Follow

Insider incidents, whether intentional or unintentional, can harm your organization in the form of financial and reputational losses, compliance violations and fines, and operational disruptions. What can you do to avoid this? How can you protect yourself against insider threats? The solution is simple: fortify your organization’s security processes with a carefully executed insider threat strategy.

The Metropolitan Opera House Gets Hit Be a Breach, Exposing 45,000 Patrons

The Metropolitan Opera is a well-established opera house that opened its doors in 1883 and has been putting on dozens of operas each year. The Met is an impressive establishment that employs more than 900 individuals, and it stores a substantial amount of customer data during its regular operations. This well-known opera house recently got hit by a data breach that puts its customers in real danger.

APTs in 2023: Characteristics, Phases & Defending Against Advanced Persistent Threats

When it comes to cyber threats, few are as feared as Advanced Persistent Threats. An Advanced Persistent Threat (APT) is a sophisticated, highly targeted and often long-term cyberattack orchestrated by well-funded and highly skilled threat actors. In some cases, they’re even backed by governments: North Korea, Russia and China have all been caught orchestrating APT attacks in the past two years. APTs differ from traditional cyber threats, which are more persistent, targeted, and sophisticated.

Bug Bounty Programs Explained: Proactively Finding Bugs for Enhanced Security

The digital world is a lot like the Old West: lawless criminals are looking to take advantage of any bug, flaw or vulnerability to exploit. To combat the problems from these flaws, many organizations offer bounties to anyone who can find them before cybercriminals. Because bugs can be challenging to spot, bug bounty programs leverage ethical hackers' expertise to spot corporate software's flaws. Some of the largest corporations in the world, including Google, Microsoft, and the U.S.

Data Encryption At Rest vs In Motion in Microsoft 365

Data is the most important resource that a company possesses. Any data loss event can be extremely disruptive, with serious consequences including regulatory fines, major revenue loss, and reputational damage. Data encryption is crucial for any organizations that deal with sensitive data including customer and employee information, payment details, company financials, M&A documents, government and defense data, and more.

CISO Backgrounds and Considerations for 2023

The CISO role has evolved in recent years. CISO’s don’t come just from technical and security backgrounds anymore. Each organization has their own distinct vision for how to solve their security needs whether they are customer, regulatory, or industry driven. I started out my career as an external auditor, with the goal of becoming a CFO.

How to prevent XPath injection attacks

Web applications are vulnerable to several kinds of attacks, but they’re particularly susceptible to code injection attacks. One such attack, the XPath Injection, takes advantage of websites that require user-supplied information to access data stored in XML format. All sites that use a database in XML format might be vulnerable to this attack. XPath is a query syntax that websites can use to search their XML data stores.

FIPS 140-2 Encryption for Mobile App Security

Data security is crucial to creating mobile apps, and businesses that create or handle sensitive data must adhere to the Federal Information Processing Standards (FIPS). Data is encrypted before it leaves the mobile device and is decoded in a safe environment thanks to the FIPS 140-2 encryption standard. In this article, we will take a look at the standards and best practices for FIPS 140-2 encryption compliance, covering the fundamentals of ensuring a safe mobile app.

RSAC 2023 | Cybersecurity research on edge computing generates big interest

RSAC 2023 was a huge success. We launched our 2023 AT&T Cybersecurity Insights Report, which was met with enthusiasm by the industry and the media. In fact, Will Townsend, writing for Forbes, noted that our report joined other great research by industry peers who are striving to do more than just provide security solutions.