Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

How cybersecurity builds a sustainable future

Here's a familiar term: sustainable development. First used in 1987, it has since taken various shapes for a plethora of uses. But right now, sustainability has become the need of the hour—the need to evolve without compromising the survival of future generations. By 2025, an estimated 1.8 billion people on this planet will not have access to drinking water. If we don't change our ways in the next 27 years, experts predict we will run out of food. And at our current rate of consumption, we need around 1.7 planet Earths to sustain us.

Audit Policy: Object Access: SAM

Audit Policy: Object Access: SAM is a setting in the Windows operating system that controls the auditing of security events related to access to the Security Accounts Manager (SAM) database. The SAM database is used to store user account information, including login credentials, on a Windows system. When the setting is enabled, the system will generate an audit event in the security log of the event viewer every time an attempt is made to access the SAM database.

CISOs: Here's How to Prove the ROI of Your Cybersecurity Budget?

‍ Even maintaining current budgets can be hard as companies look for cost savings in non-revenue-generating areas. But you don’t have to wait for a cyber attack to occur to prove that you need to invest in cybersecurity. ‍ Instead, CISOs can demonstrate the ROI of their current spend, and potentially convince other leaders to increase budgets, by using cyber risk quantification (CRQ).

EP 18 - Why Protecting Critical Infrastructure is Critical in 2023

We’re starting the new year with a conversation focused on securing critical infrastructure. The issue, of course, is that we’re seeing increased threats and cyberattacks on critical infrastructure. Not to mention the war in Ukraine. This collective threat is a rallying point, bringing together cyber professionals from around the world, as well as their respective countries.

The impact of cyber fouling and how scavengers might capitalize on it

The cyber landscape is ever-evolving. Organizations have started moving their resources to the cloud excessively to scale up their deliverables. The hybrid work culture and BYOD policies have made an organization’s network increasingly perimeter-less. With organizations adopting different policies to increase operational efficiency, SOCs scramble to ensure security in the network. As for attackers who are opportunists by nature, the hybrid work model introduces a lot of opportunities.

An ethical hacker's perspective on EASM

Gunnar Andrews discusses how ethical hackers can look to EASM techniques to help increase their ethical hacking skills. For organizations, this article gives insight into the methods and types of information that ethical hackers or even malicious attackers will collect to increase knowledge about an organization’s assets.

Four Resolutions for Security Leaders to Keep in Mind for 2023

Starting off a new year often comes with a re-energized sense of taking stock of big changes you want to make and how you want to accomplish them. And, as we come off of “prediction season”, there’s also a sense of the hot topics and challenges that are already on the horizon for the security community.

Preventing Cyberattacks Against Marketing Teams

In promoting a company and its products, marketing oversees critical points of contact between the business and its customers. Marketing teams make sure a company and its products are known in the broader market, gain the interest of potential customers and guide customers through the buying process. Just as importantly, marketing teams promote and steward a company’s brand — one of its most valuable assets.