Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

The Biggest Factors Influencing API Security Today

Application Programming Interfaces (APIs), with their ability to enable different software systems to communicate, have helped shape the digital world irrevocably. They allow developers to create more interoperable, scalable, efficient, and innovative digital services and applications across important industries such as retail, finance, manufacturing, and healthcare. However, with the explosion of API creation and usage comes inevitable risks.

Using AWS Secrets Manager and Lambda Function to Store, Rotate and Secure Keys

When working with Amazon Web Services (AWS), we often find that various AWS services need to store and manage secrets. AWS Secrets Manager is the go-to solution for this. It's a centralized service designed to help manage sensitive information securely, significantly reduce the risk of credential compromise, and facilitate your credential management process. However, there's more to it than just storing secrets.

1Password product enhancements [Summer edition]: Recovery codes, auto-save, and more

Since the beginning of the year, we’ve committed to enhancing your experience in ways that will help you easily accomplish whatever you set out to do when you open 1Password – especially saving, finding, and accessing your sensitive data across any of the devices you’re using.

The Role Regulators Will Play in Guiding AI Adoption to Minimize Security Risks

With Artificial Intelligence (AI) becoming more pervasive within different industries, its transformational power arrives with considerable security threats. AI is moving faster than policy, whereas the lightning-quick deployment of AI technologies has outpaced the creation of broad regulatory frameworks, raising questions about data privacy, ethical implications, and cybersecurity. This gap is driving regulators to intervene with guidance in creating standards that reduce the risks.

Top 4 Strategies to Demonstrate Cybersecurity's Value in the Boardroom

Cybersecurity expertise is notoriously absent from the boardroom. Only last year, a market analysis found that a mere 12% of US Fortune 500 companies have a board member with adequate knowledge of cyber risk management. However, increased cybersecurity regulations, coupled with heightened cyber event costs, have begun to highlight the need to rectify this void as soon as possible.

How to Spot and Avoid Grandparent Scams

Grandparent scams happen when a cybercriminal impersonates a victim’s family member, such as a grandchild, to convince them that there is an emergency. Despite the name of this scam, the victim doesn’t always have to be a grandparent or grandchild. The primary goal of these scams is to extort money from a victim by pretending that their loved one is in danger.

What ended up on the cutting room floor after we sliced and diced the KEV

In the course of a major research rollout like my recent whitepaper on KEV vulnerabilities, I frequently end up doing some bit of analysis that doesn’t make it into the final doc. Usually, it is because I am dealing with limited space and attention spans, and I gotta stop sometime. The stuff that gets cut is usually not terribly compelling or surprising or is maybe more an artifact of the particular bias in our sample or is only interesting to a very small audience.

Mastering modern access control with RBAC and ABAC

Managing access to resources efficiently and securely within today’s complex IT environments is paramount. Two prominent access control models, Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC), play crucial roles in this endeavor. Understanding their relationship and how they can be integrated is essential for optimizing security and operational efficiency.

SEC Fines Publicly Traded Company $2.125 Million For Negligence Before, During, and After a Ransomware Attack

According to the filing, the organization in question failed to devise controls to adequately detect, respond to, and disclose an attack that included data exfiltration and service disruption. Back in 2021, R.R. Donnelley & Sons Co.

What Is Google Chat Scam and How to Spot and Stop It

Google Chat is a popular communication software that allows you to share content and send messages in real time. Individuals use it for personal communication or collaboration with teams at work. However, as its popularity is increasing, people are using it as their primary form of communication.