Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Data Classification for Compliance with PCI DSS, NIST, HIPAA and More

Data classification is essential for achieving, maintaining and proving compliance with a wide range of regulations and standards. For example, PCI DSS, HIPAA, SOX and GDPR all have different purposes and requirements, but data classification is necessary for compliance with all of them — after all, you need to accurately identify and tag health records, cardholder information, financial documents and other regulated data in order to protect that data appropriately.

Vishing Gang Takes Victims for "Tens of Millions" Using Little More than Social Engineering

Czech and Ukrainian police have arrested six individuals responsible for a call center-based vishing scam designed to trick victims into thinking they were already victims of fraud. Imagine getting a call on your mobile phone from your bank. The caller ID shows the number you have saved in your contacts, so it must be your bank, right? The person on the other end tells you your account has been compromised and the remaining funds must be moved to a safe account. Sounds legit?

Security Awareness Training Can Help Defeat Deepfake and AI Phishing

There is no doubt that more pervasive deepfake and AI technologies will make for more realistic, sophisticated, phishing attacks, and add to an already huge problem. The days of phishing attacks rife with spelling and language errors are coming to an end. This is more the reason why you need a great security awareness training (SAT) program to fight back.

Preventing Broken Access Control Vulnerabilities in Web Applications

Access control is crucial for modern web development as it enables the management of how users, processes, and devices should be granted permissions to application functions and resources. Access control mechanisms also determine the level of access permitted and manifest activities carried out by specific entities. Broken access control vulnerabilities arise when a malicious user abuses the constraints on the actions they are allowed to perform or the objects they can access.

Top 10 Features to Look For in Vendor Risk Assessment Reports

Utilizing third-party vendors can provide numerous benefits, such as cost savings, expertise, and efficiency. Still, it also introduces a range of risks that can significantly impact an organization's security, compliance, and overall operational integrity. Vendor Risk Assessments allow organizations to understand and manage these risks, making them a vital risk management tool during procurement, initial onboarding, and the vendor lifecycle.

Why Invest? Building a Case for Increasing Cybersecurity Budgets

It’s not a matter of if your organization will face a cyber threat, but when. Cybercriminals are becoming more sophisticated, and maintaining robust cybersecurity defenses has never been more critical. However, many organizations struggle to allocate appropriate funding for cybersecurity budgets, seeing them as a grudging necessity rather than a strategic investment.

What is IAM (Identity and Access Management)?

Identity and access management (IAM) is a field of cybersecurity focused on managing user identities and developing access controls to protect critical computer networks. The specifics of an IAM policy will vary across organizations and industries. However, the main goal of all IAM initiatives remains the same: guaranteeing only approved users and devices access resources for appropriate reasons at proper times.

How To Avoid Social Media Identity Theft

You can avoid social media identity theft by setting strict privacy settings, securing your social media accounts with strong passwords, vetting every friend and follower request, keeping an eye out for phishing attempts and limiting what you share on social media. With almost every person having at least one social media account, cybercriminals are leveraging this by targeting these accounts to carry out various cyber attacks, including identity theft.

Weekly Cybersecurity Recap December 1

This week, cybercriminals targeted health lifestyle members, patients, gamblers, and general consumers. Early on, Welltok returned to the news, this time with over 426k member data stolen by assailants; the organizations impacted by the breach were Premier Health and Graphic Packaging International. In North Carolina, cybercriminals targeted a healthcare clinic. The assailants stole more than 60k patient records from Robeson Health Care.