Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Protect Your Private Packages With GitGuardian Honeytoken

GitGuardian Honeytoken provides a quick and easy way to add leakage and intrusion detection to your projects. When building your packages, just create a new Honeytoken from the GitGuardian dashboard and insert it into the project where you prefer. Then build and share that package with the team with confidence.

Exploring the World of DevRel and Security: BoxyHQ AMA with Aldin Kiselica from Cerbos

Welcome to the BoxyHQ AMA featuring Aldin Kiselica from Cerbos, experienced in the world of Developer Relations (DevRel). In this insightful conversation, Aldin dives deep into his journey to DevRel as well as security and shares his invaluable expertise with the BoxyHQ hosts Nathan Tarbert and Hung Ngo. Join us as we discuss successful DevRel strategies, community building, and nurturing relationships with developers.

What Is a Pretexting Attack?

A pretexting attack is a type of social engineering attack where the threat actor persuades their target into revealing sensitive information or sending them money by making up a story, hence the word “pretext.” Pretexting attacks can come in many different forms including a phone call, text message, email or even in person.

What To Do if a Scammer Has Your Email Address

If a scammer knows your email address, you should be extra-vigilant about phishing, and secure all your accounts with strong passwords and Multi-Factor Authentication (MFA). If you suspect a scammer has gained access to your email account, you should take steps with your email provider to secure your account and let all your contacts know you have been hacked. Read on to learn more details about what a scammer can do with your email address and how to protect your account.

Keep Your Private Code Packages Private With GitGuardian Honeytoken

GitGuardian Honeytoken provides a quick and easy way to add leakage and intrusion detection to your projects. When building your packages, just create a new Honeytoken from the GitGuardian dashboard and insert it into the project where you prefer. Then build and share that package with the team with confidence.

Evolving Trends in the Cyber Insurance Market

Cyber insurance is the fastest-growing sector of the world’s insurance markets. But, a recent increase in ransomware attacks and business email compromises has led to a sharp uptick in claims, resulting in significant losses for cyber insurers and increased premiums. Cyber insurance customers need a way to increase their cyber resilience, reduce premiums, and improve their cyber postures.

Security Questionnaires: The Complete Breakdown for Vendors

New research from SecurityScorecard found that 98% of organizations have at least one vendor that’s had a breach in the last two years. Although this doesn’t necessarily mean affiliated organizations were affected by the breaches, it does emphasize the extensive range of potential exposure to indirect risks. Now more than ever, it’s crucial for vendors to develop a deep understanding of security questionnaires and to implement best practices.

11 Proven Risk Mitigation Strategies

Risk mitigation – that is, taking steps to reduce the exposure your organization has to risks you’ve identified – is crucial to any organization. The question is how to mitigate your risks, because organizations can employ any number of strategies to do so. Some of those strategies might be excellent fits with your business model; others, less so. This article will explore 10 proven risk mitigation strategies to help organizations effectively manage and minimize risk exposure.