Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

How Colleges & Universities Can Detect Data Leaks

‍Data leaks happen when sensitive data or personally identifiable information (PII) is accidentally exposed on the internet or dark web. Typically, data leaks only occur due to poor cyber hygiene, weak network security, or software misconfiguration that can lead to unintended data exposure. Without proper data leak detection processes, cybercriminals and hackers can exploit the exposed data without the organization’s knowledge using open-source intelligence (OSINT).

Why is Cyber Vendor Risk Management (Cyber VRM) Important?

‍Cyber vendor risk management (Cyber VRM) is the practice of identifying, assessing, and remediating cybersecurity risks specifically related to third-party vendors. By leveraging data from data leak detection, security ratings, and security questionnaires, organizations can better understand their third-party vendor’s security posture using Cyber VRM solutions.

Business-Led Development- an Extension of the Public Cloud

To understand this headline better we need to have a better understanding of the traditional ways we think about Software-as-a-Service (SaaS) platforms and public cloud platforms. The difference lies in the starting point of these two solutions, while SaaS started as an extension of the corporate network, the public cloud started as an extension of the data center.

The New Innovators Pavilion in The Hub at Fal.Con 2022

Get to know some of the companies who exhibited in the New Innovators Pavilion in the heart of the Fal.Con 2022 Hub! These partners are building new, innovative solutions in, around and with the CrowdStrike platform. Hear from Freddy Ludiazo at Cyber Defense Labs , Adam Pomson at Adaptive Shield, and Oliver Wai with JumpCloud.

SmokeLoader Delivers the New Erbium Stealer

Over the past few months, a new info stealer has emerged. Erbium Stealer is developed by an underground Russian-based group that has been operating since July. The group seems to work very professionally, creating proper documentation and keeping their clients in the loop regarding new features on an almost weekly basis, via their Telegram channel.

Kroll CFO report reveals high cost of business overconfidence around cyber risk

Our new CFO cybersecurity survey, which surveyed 180 CFOs, CEOs and other financial executives worldwide, has highlighted the fact that Chief Financial Officers are very confident in their companies’ abilities to ward off cyber security incidents, despite being underinformed on the cyber risk their businesses face. Almost 87% of the surveyed executives expressed this confidence, yet 61% of them had suffered at least three significant cyber incidents in the previous 18 months.

Everything about the Online Skill Based Gaming Laws in India

According to a recent government assessment, India needs a regulatory body to oversee and categorise online gambling websites. The study, which was created by a committee of senior officials under Prime Minister Narendra Modi, advocated for involvement and tougher categorization of India’s online gaming industry.

Addressing the Cybersecurity Skills Shortage

In 2021, there were an estimated 4.19 million cybersecurity professionals in the workforce — an increase of more than 700,000 since 2020. This welcome growth suggests businesses are now taking online threats more seriously than ever. But while the cybersecurity workforce is growing, it’s still a long way from where it should be. Skills shortages in cybersecurity are currently the highest on record.

PCI DSS Readiness Assessment

The PCI Council has set a robust framework comprising a comprehensive set of requirements for enhancing the security of payment card data. So, prior to performing the final PCI DSS Audit, most Level 1 Merchants conduct a PCI Readiness Assessment. This is to validate the effectiveness of their security implementation and the readiness for the final audit.

Stories from the SOC - C2 over port 22

The Mirai botnet is infamous for the impact and the everlasting effect it has had on the world. Since the inception and discovery of this malware in 2016, to present day and all the permutations that have spawned as a result, cybersecurity professionals have been keeping a keen eye on this form of Command and Control (C2 or CnC) malware and associated addresses.