Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Compounding Complexities: Keeping Current in a Changing Cybersecurity Landscape

On the latest episode of the Security Soapbox podcast, I spoke with Ramy Houssaini, Chief Cyber and Technology Risk Officer at BNP Paribas, about the challenges Chief Information Security Officers (CISOs) face in an increasingly complex digital landscape. Change happens quickly in the cloud, and many organizations are faced with the issue of evolving their security strategy at the same pace. This ends up leaving sensitive apps and data vulnerable to cyberattacks.

The 6 Best USB Control Software of 2022 (Tech Review)

Need a USB blocker to protect sensitive files against theft to portable storage? In this article you will learn why you need to block USB devices and the best USB device management tools to prevent data loss to removable media. Looking for more tools? Check out our list of the best internet filters and the best employee monitoring software Ready to prevent data loss? Get started immediately with a free trial of AccessPatrol, CurrentWare’s USB blocking software.

Trustless Infrastructure: Securing Critical Assets with Teleport

The global pandemic and push for remote work are putting companies’ IT infrastructures at greater risk than before. This risk grows as infrastructure is scaled, and more people gain access to highly sensitive data, such as access keys to a valuable password vault. Another vulnerability is the use of passwords since they can also be compromised. To overcome these risks and protect critical infrastructure, the implementation of a zero-trust access solution is needed. But how can we accomplish that without slowing down engineers or adding administrative overhead?

Top 5 Takeaways from RSAC 2022

It’s been just over a month since cybersecurity conferences returned in a big way with the comeback of RSA Conference after last year’s hiatus. A lot happened between 2020 and 2022 in the world, our lives, and cybersecurity, including the birth of a little no-code security automation start-up named Torq. RSAC 2022 was a great place to catch up on these changes and look forward to emerging trends and security needs.

3 Key Elements for Payment Fraud Prevention in 2022 and Beyond

A San Francisco-based bank recently disclosed the results of a payment fraud investigation that uncovered ATM skimming attempts at the bank’s terminals across the United States. Fraudsters installed ATM skimming devices in several branches and used them to skim customer account information. The bank was understandably concerned that the stolen data would be used to create fake debit cards and attempt cash withdrawals.

Netskope Threat Coverage: Microsoft Discloses New Adversary-in-the-Middle (AiTM) Phishing Attack

On July 12, 2022, Microsoft researchers disclosed a large-scale phishing campaign that has targeted more than 10,000 organizations since September 2021. The campaign used adversary-in-the-middle (AiTM) phishing sites to proxy the authentication process and hijack the victims’ Office 365 session cookies.

AppSec Decoded: Application security orchestration and correlation | Synopsys

In this edition of AppSec Decoded, recorded at RSA 2022 in San Francisco, cybersecurity experts Anita D’Amico, vice president of business development with Synopsys, and Taylor Armerding, security advocate with Synopsys, discuss the specific functions and benefits of ASOC tools.

CVE Severity: Approaches for When & How To Manage Builds

In a-near perfect world, you would instantly fix your application every time a relevant CVE was issued. (In a truly perfect world, of course, there would be no security incidents, and hence no CVEs in the first place.) But in the real world, reacting to CVEs requires a careful calculation. You need to assess whether each CVE is serious enough to warrant the rejection of a build and a delay of a release.

Are your visuals making businesses more vulnerable to cybercrime?

In the world of modern business, companies must put extra effort into creating engaging visual content to stand out from the crowd. Social media marketing, for instance, was once deemed an easy way for companies to reach additional eyes but today, marketing is a lot more competitive than simply creating a post and hoping it goes viral.