Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

5 "no experience needed" tips for building secure applications

Most developers aren’t security experts. This isn’t because we don’t care about security, it’s just that there are only so many hours in the day and features come first. Fortunately, developers don’t need to be security experts to build secure apps — they just need the right tools.

How to Identify Passwords Migrated from LastPass That Need to be Updated

Many business customers have migrated from LastPass to Keeper over the past several years. As a result of recent news surrounding LastPass’ data breach, customers are asking what they should do to ensure passwords migrated from LastPass to Keeper are updated, in case backup files from LastPass that may remain on LastPass’ infrastructure, have been accessed by the attackers.

The Simply Cyber Report: December 27, 2022

New vulnerability found in WooCommerece Gift Cards Premium Wordpress plugin with CVSS score of 9.8. Fin7 has developed an AI-powered automated attacking tool called Checkmarks. Checkmarks is designed to auto-attack ms exchange systems, perform post exploitation actions, and grab enough data to allow FIN7 to understand their victim.

Everything You Need to Know About Application Security Best Practices

Software applications are the weakest link when it comes to the security of the enterprise stack. In The State of Application Security, 2022, Forrester reports that the majority of external attacks occur either by exploiting a software vulnerability (35 percent) or through a web application (32 percent). Source: Forrester: The State of Application Security 2022

9 Best Data Leak Detection Software Solutions in 2022

Data leaks are a popular attack vector for cybercriminals. They’re considered a shortcut to accessing valuable sensitive data without needing to carry out sophisticated cyber attacks. Once an attacker discovers a data leak, they can exploit it immediately. Organizations must be vigilant against internal and third-party data leaks. Otherwise, they risk leaving an instant pathway to costly data breaches exposed.

How Oversharing on Social Media Affects Your Privacy

In today’s society, social media has become a prevalent method of communication and sharing the highlights of our daily lives has become the norm. Unfortunately, there are many risks associated with oversharing in the digital world. Oversharing can be especially dangerous because of the tendency to expose sensitive information which jeopardizes your privacy and security.

Why Santa Claus Is a Huge Privacy Risk and Must Be Stopped at All Costs

He sees you when you're sleeping, and he knows when you're awake, and we're just supposed to be ok with that? He's making a list and checking it twice, but what kind of information is on that list? Does the big man in red store all the massive amounts of data he collects securely, or can all the elves peruse it at their leisure? Let's face it, Santa Claus is a huge security risk and a privacy nightmare. How does he get away with these massive breaches of your right to privacy year after year?

How to Be on Your CSO's Cybersecurity Nice List

The holidays are here, and it’s the time of year when we all want to be on the “Nice List” While this is an enjoyable time of year for gift giving and gift receiving, it’s essential to do everything possible to stay on your CSO’s nice list. No one wants a cybersecurity lump of coal! Ensuring you’re on the nice list and not the naughty list can come down to a few simple tasks that keep your security in a safe space.