Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

What is OAuth? A Complete Explanation

‍OAuth (pronounced "oh-auth”) is an authorization framework that allows an application to request “secure delegated access” to third-party systems on behalf of the apps’ users or the “resource owner.” Simply put, with OAuth, users can grant websites and applications access to their information on other websites without providing important credentials like passwords. OAuth stands for "Open Authorization”.

How to Integrate NDAs into the Vendor Risk Management Process

During the Vendor Risk Management process, information is in constant flux. From risk assessments to risk remediation processes, communication involving sensitive security control data continuously flows between an organization and its monitored vendors. If intercepted, this information stream could be used as open source intelligence for a third-party data breach campaign, nullifying the very efforts a VRM program is trying to mitigate.

Nowhere to Hide: 2022 CrowdStrike Falcon Overwatch Threat Hunting Report

Every year, CrowdStrike’s proactive 24/7 threat hunting team, Falcon OverWatch™, publishes its findings and technical analysis detailing the novel and prominent adversary tradecraft and emerging intrusion trends the team unearthed during the preceding 12-month period from July 1, 2021 through June 30, 2022. This past year in particular, OverWatch observed striking shifts in how attackers design and deploy their attacks.

Uber Investigating Alleged Breach of Critical SaaS and Cloud Security Systems

On Thursday evening, around 6:25 PM, Uber announced that it was responding to a cybersecurity incident. While Uber hasn’t gone into details about what happened, the purported threat actor has openly corresponded with several security professionals, including Sam Curry at Yuga Labs, Corben Leo at Zellic.io and The New York Times. According to both Curry and Leo, multiple systems were impacted.

Unifying Project Data at All Phases with Egnyte and Autodesk

A successful building project requires vast data, from architects' drawings to engineers' calculations to builders' material lists. Projects can quickly become chaotic without a platform to unify and manage this data as important information gets lost in the shuffle. That's why it's vital to have a system for unifying design and construction project documents. By unifying all the data in one platform, everyone involved in the project can easily access the information they need when they need it.

Top 18 CIS Critical Security Controls for Cyber Defense

With the cost of a data breach at an all-time high of $4.35 million and regulations worldwide imposing steeper penalties for compliance failures, organizations must ensure that they have all necessary security controls in place to keep their data safe. Implementing the CIS Controls provides a sound foundation for effective defense against cyber threats First developed in 2008, the CIS Controls are updated periodically in response to the evolution of both technologies and the threat landscape.

Compliance: The False Sense of Security

I know many will read this title and think that I am crazy. If I am compliant with NIST, HIPAA, ISO, PCI, etc., then I am running a secure network. And to a point that is true. But let’s look at it this way. If you are driving down the interstate at the posted speed limit and are keeping three car lengths between the driver in front of you, are you truly safe and secure on the interstate?