Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Physical threats to Cybersecurity that you must address

Over 90% of data breach is attributed to human error costing a company anywhere from $1.25 million to $8.19 million. Tackling cybersecurity does not only entail non-physical risks, but also includes an assessment of physical threats such as human, internal, and external hazards. Only then can an appropriate and effective security plan to dissuade hackers and thieves be devised.

What is Cyber Risk?

Cyber risk is defined as exposure to harm or loss resulting from data breaches or cyber attacks on information systems, information technology and information security. However, this definition must be broadened. A better, more encompassing definition is the risk of financial loss, disruption or reputational damage due to the failure of an organization's cybersecurity strategy.

Sysdig 2019 Container Usage Report: New Kubernetes and security insights

We’re excited today to release the Sysdig 2019 Container Usage Report. Continued momentum for Kubernetes and greater adoption of cloud-native architectures are changing not just usage patterns, but processes and organizational structures as well. One of the surprising insights this year is the 2X increase in the number of containers that live for less than five minutes. As services grow more dynamic, cloud teams are recognizing the need to integrate security into their DevOps processes.

Image scanning for Azure Pipelines

In this blog post, you’ll learn how to setup image scanning for Azure Pipelines using Sysdig Secure DevOps Platform. Azure DevOps gives teams tools like version control, reporting, project management, automated builds, lab management, testing, and release management. Azure Pipelines automates the execution of CI/CD tasks, like building the container images when a commit is pushed to your git repository or performing vulnerability scanning on the container image.

Country of Georgia Hit by Widespread Cyber Attack

The small country of Georgia was hit by a cyberattack on Monday, knocking the national TV station and 2,000 websites offline in the nation's largest-ever cyberattack. A local web-hosting provider, Pro-Service, took the blame, claiming one of its servers that powers websites for media organizations, state agencies, and the private sector, was the target of the attack. The attack resulted in roughly 15,000 subscribers of website servers on the Pro-Service server crashing.

Leadership Through Security: The Changing Role of the CISO

The traditional career path for a chief information security officer (CISO) is fairly straightforward. An individual begins their career in IT but ultimately moves to security after demonstrating a security mindset. Once established within the ranks of information security, the professional receives promotion after promotion until they attain the title of CISO.

Was the largest breach in history a misconfiguration problem?

Earlier this week, I heard a fascinating interview with the former Chief Information Officer of Equifax, Graeme Payne. If you are unfamiliar with Graeme, he was the scapegoat for the Equifax breach; described in Congressional testimony as “the human error” that caused the breach. Graeme, however, is a true gentleman who is very gracious about his situation.

Italian Bank UniCredit Suffers Data Breach

Unicredit has reported a breach of its IT systems resulting in the leak of information belonging to over 3 million customers. The bank confirmed on Monday that a file created in 2015 containing three million records involving Italian clients is the source of the security incident. The victims' names, telephone numbers, email addresses, and cities where clients were registered are among the information compromised.