Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Doing More With Less: Security Integration and Automation within the Financial Sector

With many financial institutions continuing to feel an impact from The Great Resignation, and seeing tighter budgets across the board in 2023, security leaders are being asked to do more with less. So far in 2023, many organizations are hesitant to hire additional staff or even backfill open positions—forcing many security leaders to make do with fewer people than in the past.

Material Security's Ryan Noon: Building & marketing a differentiated cybersecurity solution without spreading FUD

In this episode of Future of Security Operations, Thomas speaks with Ryan Noon, Founder and CEO of Material Security, a company that protects the email of high-risk VIPs and top global organizations. A serial entrepreneur and an expert on cloud security, Ryan previously ran infrastructure teams at Dropbox after it acquired his last company, Parastructure. Before that, he helped build a company spun out of Stanford by the Department of Defense.

What is a Privacy Policy?

A privacy policy is a statement that companies have on their website that informs users about the collection, processing, protection and use of their private data. Users are often prompted to review and accept privacy policies, but many of them don’t read through these policies because they don’t think it’s necessary. It’s important to read through these policies to know what information is being collected and how it’s being used.

As Managed Cybersecurity Services Become the Norm, Unified Platforms Are Essential for MSPs

The cybersecurity industry is constantly adapting and reinventing itself as the complexity of the threat landscape is increasing each year. Unskilled and insufficient employees are significant barriers making organizations unsafe. The lack of competent cybersecurity partners and the shift to remote working are additional barriers to making organizations secure. Organizations are therefore turning to MSPs to address these challenges.

3 Ways To Protect Yourself From Social Engineering Scams

The “Great Resignation” is still well underway, further impacting a cybersecurity industry with a historically low retention rate. According to a report published by Enterprise Strategy Group in partnership with Information Systems Security Association International, 76% of organizations say it is difficult to recruit and hire security professionals.

Unknown Number? What Is Vishing and How Scammers Pull It Off

According to the 2020 FTC Data Report, vishing constituted 31% of fraud reports, with an aggregated loss of $436 million. That's a lot of vishing. Scammers' methods have become out-of-this-world, too. Years ago, a social media video of a police officer taking a scam call in real time became viral. The scammer, posing as a banking representative, requested personal information on the pretext of verifying their account. The officer was uncooperative.

Enforcing Role-based Access Control (RBAC) Policies with OPA

A common use case our customers have for Open Policy Agent (OPA) is access control. The problem of access control is generally broken down into two parts, authentication and authorization. Authentication is about making sure we can trust someone’s stated identity, authorization is making decisions about who can do what.

The Ultimate Guide to Sigma Rules

In cybersecurity as in sports, teamwork makes the dream work. In a world where security analysts can feel constantly bombarded by threat actors, banding together to share information and strategies is increasingly important. Over the last few years, security operations center (SOC) analysts started sharing open source Sigma rules to create and share detections that help them level the playing field.

Microsoft Direct Send - Phishing Abuse Primitive

This vector abuses Microsoft Direct Send service in order to propagate phishing emails from an external sender to an internal user, whilst spoofing the properties of a valid internal user. This “feature” has existed since before 2016. However, threat intelligence available to JUMPSEC has only observed it being abused recently.