Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Detecting Data Exfiltration Via the Use of SNICat

I used to have a cat who loved ice cream. I think I may have given her some as a kitten, and from then on, anytime that she saw someone eating ice cream she would do her best to try and steal some from them. And even if she didn’t really seem to enjoy a particular flavor, she still seemed driven to try and steal that person’s ice cream. Like my cat stealing ice cream, bad guys are constantly trying to target organizations and their data for nefarious purposes.

Port scanner 101: What it is and why should you use it

In today’s complex network infrastructure comprised of diverse resources, devices, and users, port scans represent a significant amount of network traffic. Crackers and hackers alike use port scanners to discover port vulnerabilities that can become attack vectors to malicious outcomes. In this post, we discuss the fundamentals of port scanning, and why you need to deploy an effective port scanner software on your network right now.

What is a Cloud Access Security Broker? CASB explained

A common component of modern cybersecurity infrastructure, a cloud access security broker (CASB) is technology that provides monitoring and mitigates risks from employee use of cloud services. CASBs were initially developed to fill a gap in cloud security visibility left behind by traditional firewalls, next-generation firewalls, and early secure web gateways, which struggled to identify instances of the unapproved use of cloud services, otherwise known as shadow IT or rogue IT.

Best data security practices when offboarding employees

In times long gone, disgruntled former employees could only do so much damage to your company, and relatively little at all to your data security. In the fast-moving world of the 21st century, however, it’s a different story. Costly data breaches and devastating thefts have been undertaken in recent years by dissatisfied staff members released from their job duties.

Prilex Brazilian Threat Group

This blog summarizes the findings of an investigation into the current status of the Brazilian threat group known as 'Prilex' who came to prominence in late 2017 and early 2018 for their ATM jackpotting and point-of-sale (POS) terminal attacks. Whilst the group were believed to have been active since 2014, a distinct absence of 'chatter' and reporting of their activity since 2018 seemingly suggested that the group had ceased operations.

SASE and the Forces Shaping Digital Transformation Part 1: Businesses Strategy and Information Technology Ops

At the convergence of digital transformation, an industry-wide focus on SASE, and the effects of the continuing COVID-19 pandemic, there are key forces that security practitioners need to be aware of and operate within. This is the first blog in a series of three detailing these forces and how security leaders and practitioners can adapt to them in a digitally transforming, SASE-enabled world. This blog covers the forces of Business Strategy and Information Technology Operations.

What is eBPF and How Does it Work?

About a year ago, a friend of mine decided to build an EVM (Ethereum Virtual Machine) assembler in Rust. After some prodding from him, I began to help by writing unit tests. At the time, I knew very little about operating systems and started to read about lexical and symbolical analyzers. I was quickly in way over my head. What I did retain, however, was a newfound appreciation for the OS as a whole. So, when he started raving about eBPF, I knew I was in for a treat.

How to Write a Work From Home Policy (Free Template) | CurrentWare

The demand for remote work isn’t stopping anytime soon. Did you know that 77% of employees want to keep working from home after COVID-19? In this video CurrentWare’s managing director Neel Lukka tells you the things you MUST include in your work from home policy. To help you get started we’ve provided a work from home policy template that you can download and customize to fit the needs of your business.

Driving the Cybersecurity Agenda with the C-Suite and Boards

Veracode CEO Sam King joins the Advanced Cyber Security Center, the Boston Globe’s Jon Chesto, MassMutual CISO Jim Routh, and State Street CTRO for a fireside chat about the strategic role the C-suite and corporate boards play in cybersecurity. Sam describes why communication between the board, the C-suite, the CISO, and the security team must be frequent to add value from both a governance and compliance perspective.