Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Lookout contributes to 2022 Verizon MSI With Mobile and Cloud Security Insights

One of the best ways to stay up to date on how mobile devices affect your organization's security is by reading the Mobile Security Index (MSI) by Verizon. Lookout is a long-time contributor to the report, including the 2022 edition that was just published. This year’s MSI is especially interesting, as it dives deeper into the interconnectivity that now exists between endpoint devices and cloud applications.

Today's Security Tidbit: An Encrypted JSON File Containing Malicious Code

As security researchers, we see new malicious methods being introduced on a daily basis from the ever-industrious global cadre of malicious actors. But not all of the things we find constitute breaking news. Sometimes, we run across something that doesn’t necessarily pose a threat, but still piques our interest. Instead of being the security equivalent of a four-course meal, it’s more of an amuse bouche.

4 Benefits CIOs Ought to Know About SSE

As a CIO it is very easy to get “new-acronym-deafness.” New innovations need new words and name-tags to identify them, and while analysts work hard to provide benchmarks and standardised definitions, it can be hard to keep up. At Netskope we know how confusing it can get, because sitting at the vanguard of emerging categories means we have had to do our fair share of explainers and re-labelling over recent years.

8 Essential Elements for an Incident Response Plan

In the first blog of our two-part incident response series, we explained how your organization can jump-start its incident response. In this second part, we’ll focus on the essential elements of an incident response plan—a critical factor for any company trying to recover from an incident quickly and confidently.

Auto Industry at Higher Risk of Cyberattacks in 2023

Cyberattacks are an increasingly common occurrence for a spectrum of industries. Rising cybercrime affects everyone, but certain sectors are more at risk than others. In 2023, the auto industry could face particularly significant dangers. Attacks in the automotive space can impact automakers, automotive fleets, and consumers alike. Reducing these risks will be crucial as more cybercriminals seek to capitalize on the sector’s vulnerabilities.

The Convergence of Security and Observability: Top 5 Platform Principles

With the advances in technology and an unpredictable macro environment, IT professionals have to deal with a deluge of data, increasing cyberthreats, distributed infrastructure and workforce, a mix of modern and monolithic apps and hybrid environments. Although there is significant momentum towards the Cloud, many organizations cannot move all of their data to the public cloud due to security, compliance or technical constraints.

How to Secure Redis

Redis is an in-memory data store that stores data in key-value pairs. It’s primarily used as a cache for quick data access, as a database, and as a message broker. Redis doesn’t have a default authentication setup in place exposing it to security vulnerabilities, which if exploited could potentially affect the infrastructure of the entire organization. These security vulnerabilities are what make securing your Redis database so important.

Credential harvesting: Is it too big of an attack or can you fight back?

The hybrid working model is the new norm due to its effectiveness and the productivity it offers. However, it does pose significant drawbacks to an organization's network security, making it vulnerable to several cyber-attacks such as credential harvesting.