Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

Security Strategies for Mitigating IoT Botnet Threats

As DevSecOps continues to redefine the IT security landscape, security is becoming everyone’s responsibility. That means that staying ahead of the latest cybersecurity threats—such as IoT botnets—should be a priority for every DevOps professional. To help you do that, this article discusses strategies for combating IoT botnets.

Insider Threats: Root Causes and Mitigation Practices

The recent IBM 2019 Cost of Data Breach survey found that the cost of a data breach had risen 12% over the past 5 years to $3.92 million on average. While 51% of the data breach attacks were attributed to malicious or criminal actors, a stunning 24% of the breaches were caused by negligent employees or contractors. The report also notesed that the 51% of the criminal actors included, “malware infections, criminal insiders, phishing/social engineering and SQL injection.”

Falco in the open

One of the most successful aspects of Kubernetes is how functional the open source community was able to operate. Kubernetes broke itself down in smaller sections called special interest groups, that operate similarly to subsections of the kernel. Each group is responsible for a single domain, and sets their own pace. One of the most important things to a Kubernetes SIG, is the residual SIG calls.

34% of Vulnerabilities Reported in First Half of 2019 Remain Unpatched

According to the latest 2019 Mid-Year Vulnerability Report, over 34% (3,3771) of all vulnerabilities reported in the first half of 2019 do not currently have a documented solution. The report by Risk Based Security claims this lack of patch availability is due to lack of information regarding the flaw or due to lack of a patch release.

Five Ways AI is Cutting Costs in Start-Ups and Small Businesses

Companies of various sizes have embraced the concept of the lean startup. Organizations are continually looking for ways to save money and stretch limited budgets to the max. Thanks to the growth in diverse applications of artificial intelligence, technology is helping companies achieve this goal.

Disruption: The True Cost of an Industrial Cyber Security Incident

Industrial control systems are essential to the smooth operation of various national critical infrastructure. While once segmented from the web, these systems are now becoming increasingly more networked and remotely accessible as organizations transform to meet the digital age. This development potentially exposes industrial control systems to digital threats.

Researcher Warns of Airlines Failing to Protect Customer Data

Many airlines allow passengers to view and make adjusts to flight details by using a unique identifier often called the booking reference, or passenger reference number, and the customers last name. Unfortunately, there are several airlines that have not implemented mechanisms that would prevent someone from obtaining the PNR through a brute force attack on an airlines' booking management system.