Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

BitSight & RSA 2023: How Security Leaders Are Preparing for the "New Era" of Cybersecurity Disclosure

In response to the growing number of cyber incidents, policymakers and regulators around the world are creating new cybersecurity requirements for companies to comply with, including mandates to disclose cyber risks and incidents. For example, new cyber risk disclosure requirements from the U.S. Securities and Exchange Commission (SEC) are anticipated to be adopted in 2023 and would have a major impact on corporate cybersecurity initiatives.

Preventing insecure deserialization in Node.js

Serialization is the process of converting a JavaScript object into a stream of sequential bytes to send over a network or save to a database. Serialization changes the original data format while preserving its state and properties, so we can recreate it as needed. With serialization, we can write complex data to files, databases, and inter-process memory — and send that complex data between components and over networks.

The Benefits of Customized Regtech Solutions for SIs and their Clients

As a service provider for obligated organizations, it is essential to understand the factors driving the need for collaboration with regtech providers. It’s not just about adopting new technology; the real potential lies in effectively addressing anti-money laundering (AML) threats and streamlining regulatory compliance. Regulators consider regtech to be critical to modernizing the financial sector and ensuring clarity in supervisory expectations.

Top Identity Verification challenges faced by regulated industries and How to overcome them

Identity verification has become an essential aspect of various industries in today’s world. With the advent of technology and the growth of the digital economy, it has become increasingly important for businesses to verify the identities of their customers, clients, and partners. However, regulated industries such as finance, healthcare, and gambling face unique identity verification challenges due to the sensitive nature of their services and the regulatory requirements they must comply with.

Cybersecurity in the Energy Sector: Risks and Mitigation Strategies

The demand for cybersecurity in the energy sector is often understated. There is a misconception that very little IT is involved, and much of it does not impact operations. But 97% of surveyed ICS security professionals in the energy, oil, and gas sector believe cybersecurity is a growing concern. No industry has been untouched by digital transformation.

What Is Microsegmentation and 5 Compelling Security Use Cases

Microsegmentation is a security technique that partitions a network into small, isolated sections to reduce the attack surface and reduce an organizations risk. Each microsegment is typically defined by specific security policies, accessible only to authorized users and devices.

How to establish network security for your hybrid workplace

The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. The global COVID-19 pandemic has left lasting effects on the workplace across all sectors. With so many people required to stay home, businesses in every field turned to remote work to open new possibilities for staying connected across distances.

Security Training Shouldn't Be A Stress Test

A lengthy, stressful test is what comes to mind when most people hear the acronym “SAT.” But the other “SAT” — a security awareness training, or SAT, program — can also embody those qualities if it’s not managed correctly, and cause just as many headaches for an organization fighting to mitigate phishing attacks and social engineering scams.