Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Using a Ransomware Assessment to Identify Gaps & Risks

FSIs face a myriad of challenges, and the impact has resulted in a 1,318% increase in ransomware attacks in 2021. Given the increasing sophistication of these attacks, there is a growing need for FSI’s to understand their level of risk and to implement a proactive approach to defending themselves.

Breaking Down the Complexity with Cloud Through BAS

As FSIs adopt new technologies to increase business efficiencies and drive new business, they are now operating with new applications, devices, and infrastructure. This not only increases their attack surface, but also the level of risk to their company and customers. But, traditional scanning and testing technologies struggle in a multi-cloud world. In this session, SafeBreach CISO Avishai Avivi will discuss how you can cut through the noise and simplify the testing of cloud controls.

Welcome & Keynote: Increasing Attack Surface for FSIs

FSIs often have some of the most comprehensive and mature security controls across all industry sectors, but the rewards are high for criminals who seek to gain direct access to their network and valued customer data. As FSIs update their IT and security technology and programs, managing the growing attack surface will continue to become more complex and dispersed. In this session, SafeBreach Director of Research Tomer Bar will share how attacks are conducted, which APT group have been the most active, and what risks they pose to FSI’s.
Featured Post

Into the future: what might cybersecurity look like in 2023?

As we enter into 2023, cybersecurity must be at the forefront of our minds. With hackers becoming increasingly sophisticated in their techniques and the number of endpoints growing exponentially due to the explosion in the number of connected devices, it is critical that over the next 12 months we consolidate our efforts to stay one step ahead of the threats.

What Are CIS Benchmarks (Guide For 2023)

There are numerous CIS benchmarks which provide system administrators and other IT technicians with configuration baselines and best practices across the various levels of different CIS criteria to allow them to secure the configuration of any systems and devices they use within an organisation. Here we will provide you with a detailed overview of what CIS benchmarks and controls should mean to you, along with useful references for further reading where needed, as part of this guide.

Cybersecurity challenges facing SMBs and steps to protect them

Businesses come in many different sizes, yet, they all share one similarity; the growing need for cybersecurity in today’s ever-changing technology landscape. While large companies with robust security infrastructure and experience may ward off many aspiring cybercriminals, small to medium-sized businesses (SMBs) prove to be ideal targets.

What are CIS Benchmarks and how to use them?

A list of 18 procedures (reduced from 20), or “controls,” recommended by the Center for Internet Security (CIS), must be followed to build an IT infrastructure resistant to cyberattacks. The CIS 4th Control advises to establish and maintain a secure configuration process for enterprise assets (end-user devices, including portable and mobile; non-computing/IoT devices; and servers) and software (operating systems and applications) (4.1).

Why Small Businesses Need a Password Manager

Small business owners often have to wear many hats to keep their businesses up and running. As these businesses move forward and grow in size, not only do the responsibilities build up, but so does the risk of cybercrime. For small businesses, a password manager is essential as it guarantees secure password sharing, simplifies onboarding and offboarding employees and more.

Understanding the U.S. State and Local Cybersecurity Grant Program

With over 90 thousand different state and local governments across the U.S., creating a unified approach to cybersecurity and defending all of these counties, cities, territories, states, and commonwealths is not only in each of their interests, but the national interest as well.

What were the biggest cyberattacks in 2022?

Cyberattacks consistently hit the headlines throughout the year, and they aren’t expected to slow down any time soon. While the intensity and impact change from one attack to the other, there are always a few that rank the highest in terms of size. We looked at the five biggest cyberattacks of 2022 and how they influenced users around the globe.