Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

What is a Security Breach?

A security breach is when an incident occurs that results in unauthorized access to sensitive data, applications, networks or devices. Typically, when a security breach happens the intruder is able to bypass security measures that were put in place to keep them out. As a result of a security breach, a company or organization’s public image suffers, which can lead to the company losing money. The company or organization could also suffer legal consequences.

Cockroach Labs and Teleport - Hyper-Scale Your Database Without Sacrificing Security

According to a recent Gartner study, the fast pace of change across technologies, organizational priorities, business opportunities and risks requires identity and access management architectures to be more flexible. As digital business relies on digital trust, security and identity are — more than ever — an essential foundation of an organization’s business ecosystem.

What are Tabletop Exercises? How They Can Improve Your Cyber Posture

According to the latest IBM Cost of a Data Breach Report, the average breach costs $4.35M per incident, climbing by 12.7% from 3.86 million USD in IBM’s 2020 report. This does not account for lost business opportunities and lingering reputational damage. A cybersecurity tabletop exercise could substantially reduce this amount simply by having a well-thought-out incident response plan and effectively exercising business continuity plans.

OWASP Verification Standard: Application Security and Standards

At the beginning of August, CREST partnered with OWASP to release the OWASP Verification Standard (OVS), which is designed to formalise and expand on OWASP’s existing work on application security and their own security standards, including their Top 10 Project. OWASP has existed since December 2001 and has been supporting penetration testers and developers alike ever since with tens of thousands of participants.

What are Elastic Security capabilities in the cloud - and how do they drive results?

Cloud-based SIEM, long a forward-looking topic, is here and now. In fact, advanced organizations will spend 27% more on cloud cybersecurity as a percentage of IT spending in 2022 vs. 2021 as they expand their use of cloud providers, services, and integrations with other technologies. There are a myriad of benefits to conducting security operations on a cloud-based platform.

Cyberthreat Trends in 2022H1: Threat Actors Observed, New Malware and Active Hacking Groups

In our companion blog post, Vedere Labs analyzed the main ransomware trends we observed in the first half of 2022, including state-sponsored ransomware, new mainstream targets and evolving extortion techniques. Ransomware is the main threat targeting most organizations nowadays. However, three other notable cyberthreat trends also evolved during this period: Below we analyze each of these trends in more detail.

The ClubCISO report reveals a fundamental shift in security culture

With business and technology becoming increasingly intertwined, organizations are being forced to rethink how they look at digital security. Once overlooked or viewed as a mere afterthought, today it has become a business-critical necessity. As a result, organizations across industry lines are racing to improve their security postures.

How to Correctly Classify Your Data in 2022

Data classification can feel like an overwhelming task, especially for organizations without a strong practice in place. As with any security approach, data classification is both crucial and tempting to avoid. Regardless of whether the value is recognized, there’s a chance that it gets pushed further and further down the priority list in favor of items that are easier to address.

Recognizing and Stopping Insider Threats in the Healthcare Industry

As a direct result of COVID-19 burnout, the ongoing Great Resignation trend might be impacting healthcare more than any other industry. Research shows that healthcare has already lost an estimated 20% of its workforce over the past two years. This turnover is happening top-to-bottom throughout organizations. Doctors are switching between hospitals, administrative staff are leaving the industry, and technology teams are being lured away by higher paying jobs in other sectors.

The Looming Issue with Email Sharing

If you’ve been following my suggestions in this series, then your SaaS sharing configuration now protects sensitive information and your IaaS/PaaS access controls accurately follow the principle of least privilege. Of course, that doesn’t mean you’re done! We must now tame the giant of all file-sharing beasts: email. An email is probably the worst way to share files because there’s no way to limit who sees the file after it is sent.