Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Best Practices for Securing Git LFS on GitHub, GitLab, Bitbucket, and Azure DevOps

Git Large File Storage (Git LFS) is an open-source Git extension that handles versioning for large files. It optimizes git repositories by storing data separately from the repository’s core structure, making it much easier for developers to manage binary assets. However, such an efficiency requires proper security and configuration to function optimally. Utilizing best practices, like access control, encrypted connections, and regular repository maintenance, firmly secures the Git LFS performance.

EP 67 - The Password Problem

In this episode of the Trust Issues podcast, host David Puner sits down with Andrew Shikiar, the Executive Director and CEO of the FIDO Alliance, to discuss the critical issues surrounding password security and the innovative solutions being developed to address them. Andrew highlights the vulnerabilities of traditional passwords, their susceptibility to phishing and brute force attacks, and the significant advancements in passwordless authentication methods, particularly passkeys.

Why Controversial Phishing Emails Do Not Work

Frequently, when a cybersecurity training manager sends out a controversial simulated phishing attack message that angers a bunch of employees and ends up making headlines, we get called by the media to comment on the story. Here are some examples of potentially controversial simulated phishing messages: I have read many stories of security awareness training managers sending simulated phishing emails with these types of messages, often around Christmas or other national holidays.

New Measures Signal Progress for Stalking Victims in the UK

The Home Office has introduced new guidance aimed at strengthening protections for stalking victim-survivors in England and Wales. Under the updated measures, police will be required to inform individuals if they uncover the identity of a stalker, including those operating anonymously online. Additionally, stalking protection orders will be toughened to prevent convicted stalkers from contacting their victims while in prison.

The Rise of Phishing Attacks: How New Domain Extensions Are Fueling Cyber Crime

In recent years, the world of cybersecurity has witnessed a concerning trend: a significant increase in phishing attacks. A new study reveals that these attacks have surged by nearly 40% in the year ending August, 2024. What's particularly alarming is the role played by new generic top-level domains (gTLDs) in this spike. While gTLDs like.shop, .top, and.xyz make up only 11% of new domain registrations, they account for a staggering 37% of reported cybercrime domains.

CrowdStrike Named a Leader in 2024 Frost Radar for Cloud-Native Application Protection Platforms

Frost & Sullivan has recognized CrowdStrike as a leader in its Frost Radar for Cloud-Native Application Protection Platforms (CNAPP) for the third consecutive year. CrowdStrike Falcon Cloud Security continues to set the standard for securing hybrid and multi-cloud environments, as evidenced by our placement at the forefront of both the Innovation Index and Growth Index.

Building a Scalable Permissions Service: Overcoming Challenges in Access Control

Permissions are at the center of every operation at Egnyte. Every interaction any user has with the system is bound to go through a stringent permission check,be it creating a file, copying it, moving it, sharing it, deleting it or using an operation as simple as adding comments. The permissions model is extremely crucial as without it, data leaks, incorrect access escalations, and unauthorized operations can occur.

It's Typhoon Season: Attackers are deliberately evading EDR. What can you do about it?

Over the past year, several sophisticated cyber-espionage campaigns have grabbed the attention of our industry and challenged defenders and vendors alike with advanced tactics, techniques, and procedures (TTPs). One of the most visible campaigns is Volt Typhoon, named by the Microsoft threat intelligence team in May 2023 and attributed to Chinese state-sponsored threat actors.

MobiFin and INETCO partner to deliver cutting-edge digital banking and payments security

MobiFin, a leading provider of unified digital banking and payment solutions, has entered into strategic partnership with INETCO, an innovative real-time transaction monitoring and fraud prevention company. INETCO has established a significant global footprint by implementing its innovative solutions across more than 27 nations, serving some of the most prominent financial powerhouses worldwide.

ISO 27001 Audit Checklist: What Can You Expect?

The full process for achieving ISO 27001 compliance is lengthy, expensive, and difficult. While you can take many steps to make it easier, faster, or cheaper, there’s only so much you can sidestep the ground-level legwork that needs to be done to succeed. Fortunately, we can help you smooth out the process. A few weeks ago, we published a checklist for the full process to achieve ISO 27001 certification.