Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Five worthy reads: The rise in credential stuffing attacks

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week we explore how credential stuffing attacks are evolving and why they pose a greater threat than meets the eye. Credential stuffing is perhaps the simplest form of cyberattack, but it continues to make headlines despite its lack of sophistication. It has become the attack method of choice for cybercriminals primarily because of its high success rate and ROI.

Gamifying cyber security training

At Bulletproof, we know that different people learn in different ways. So when a healthcare provider came to us needing an innovative, engaging way of delivering security awareness training, we stood ready to deliver. The healthcare provider in question was St Andrews Healthcare – providers of specialist care for people with challenging mental health needs. Being a company that works with vulnerable individuals, staff awareness of cyber security is essential.

Rickard Carlsson on ASW: "Finding vulnerabilities in staging doesn't matter; what matters is what's live."

Rickard Carlsson, CEO of Detectify, recently joined as a guest speaker on the Application Security Weekly Podcast hosted by Mike Shema, Matt Alderman, and John Kisella.They discuss how Detectify’s solution is a game changer by combining the speed of automation and hacker expertise, why you should trust developers with security, and how the modern digital landscape requires even devs to look at the asset inventory. We’ve highlighted some interesting points in the interview.

Hindsight 2020: Revisiting Netskope's Cybersecurity Predictions for the Year No One Saw Coming

2020, as a year, has been anything but predictable, but we’re proud to say we got even a few things right. Here’s a look back at some pretty big trends, a couple of things that sort of happened, and at least one big miss.

What is clickjacking and how can I prevent it?

Cyber attackers are continuously cultivating their methods to evade detection. Now, they can cloak a seemingly innocuous webpage with an invisible layer containing malicious links. This method of attack, known as clickjacking, could cause you to activate your webcam or transfer money from your bank account. In this post, we outline the different types of clickjacking attacks and teach you how to best defend yourself against this application security threat.

Myth Busting 101: Challenging stereotypes and grasping opportunities

As women in tech, the stereotypes put upon us – and particularly those we accept, internalise and resign ourselves to can become the mantras of our whole careers. From “not being technically minded enough” to being “unable to cope with the demands of the job”, our gender and ethnicities can dictate the positions we apply for and hold, and how far we’ll climb.

Grow your Small Business with Workforce Intelligence

Did you know that collecting data regarding employee behaviors and patterns can help business owners create accurate, efficient business plans? Companies are using workforce intelligence to accurately and objectively build stronger internal organizations using big data. Workforce intelligence uses a combination of artificial intelligence, SaaS tools, analytics, and visual reporting to help employers oversee and manage employees more effectively.