Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

What is a Ponzi Schemes: History and Examples

Ponzo schemes continue to grow in complexity and notoriety. These schemes are not transactions or one-time hacks. “Ponzi schemes are fraudulent business operations that promise high returns with little or no risk, claiming investors' money will go towards a legitimate investment.” Investors believe they will score huge returns from their initial investment, yet most only realize once it is too late that the entire scheme is doomed to fail from the beginning.

Discover, Assess, and Protect Confidential Information with Lookout

Learn how Lookout helps identify, classify, and protect sensitive data with real-time data protection and encryption policies. With Lookout's Secure Service Edge (SSE) platform, zero trust data protection policies extend seamlessly across Software-as-a-Service (SaaS), private, and web applications. Experience the simplicity of a unified policy engine that handles masking, redaction, encryption, watermarking, and classification, enhancing both security and administrative efficiency.

Working From Home - and Homing From Work - Poses Unique Cybersecurity Challenges

Since 2020, working from home has become commonplace. In the wake of the COVID-19 pandemic, almost every company had to switch their traditionally in-office employees to some version of hybrid or remote work. Indeed, working from home became the new “normal” almost overnight. We all have a variety of collective experiences and observations during this time of no longer commuting to work, sitting in a cubicle, or chatting with coworkers at the water cooler.

Mastering modern access control with RBAC and ABAC

Managing access to resources efficiently and securely within today’s complex IT environments is paramount. Two prominent access control models, Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC), play crucial roles in this endeavor. Understanding their relationship and how they can be integrated is essential for optimizing security and operational efficiency.

What Is Google Chat Scam and How to Spot and Stop It

Google Chat is a popular communication software that allows you to share content and send messages in real time. Individuals use it for personal communication or collaboration with teams at work. However, as its popularity is increasing, people are using it as their primary form of communication.

Identity Crisis: The Curious Case of a Delinea Local Privilege Escalation Vulnerability

During a recent customer engagement, the CyberArk Red Team discovered and exploited an Elevation of Privilege (EoP) vulnerability (CVE-2024-39708) in Delinea Privilege Manager (formerly Thycotic Privilege Manager). This vulnerability allowed an unprivileged user to execute arbitrary code as SYSTEM. CyberArk responsibly disclosed this vulnerability to Delinea, including the exploit proof of concept (POC) code, as part of our commitment to contributing to the security community.

What is Protected Health Information (PHI)? And why is it important?

“Safeguarding personal health information (PHI) is governed under the Health Insurance Portability and Accountability Act (HIPAA).” Protecting identifiable health data is the responsibility of everyone who comes into contact with it, including covered entities. Healthcare providers, health plan companies, school districts not covered under FERPA, universities, employers, and federal, state, and local government agencies are mandated to protect PHI data from any security risk.

How to Spot and Avoid Grandparent Scams

Grandparent scams happen when a cybercriminal impersonates a victim’s family member, such as a grandchild, to convince them that there is an emergency. Despite the name of this scam, the victim doesn’t always have to be a grandparent or grandchild. The primary goal of these scams is to extort money from a victim by pretending that their loved one is in danger.

New Report: How SME IT Professionals Really Feel About Security, AI, MSPs, and More

Twice a year, JumpCloud commissions a survey of IT professionals working at small and medium-sized enterprises (SMEs). These surveys examine pressing current matters like the security landscape, emerging technologies, job outlook, and more. JumpCloud’s latest report was released on July 16. It surveyed 612 IT decision-makers in the U.K. and U.S. to get a read on the SME IT market, both today and where IT professionals think it’s headed in the future.