Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

5 reasons why MSPs can't win the Microsoft 365 security game using Secure Score (and what to do about it)

1. Limited Scope of Security Metrics Microsoft Secure Score assesses security configurations and behaviors within the Microsoft 365 ecosystem but does not account for external threats. MSPs need a holistic security approach that includes network security, endpoint protection, and third-party integrations, which Secure Score does not cover (S:1).

Navigating Security Challenges in Hybrid Infrastructure

As organizations increasingly adopt a mix of cloud-based and on-premises systems, they face unique challenges in securing their hybrid infrastructures. Unlike traditional IT setups, where everything is managed within the confines of a single data center, hybrid infrastructures combine the agility of the cloud with the control of on-premises systems. While this blend offers flexibility and scalability, it also introduces security complexity and a broader attack surface.

Google Authenticator vs Keeper

An authenticator app is a method of Multi-Factor Authentication (MFA) that adds an extra layer of security to your online accounts. Keeper can be used in place of Google Authenticator as it stores, generates and automatically fills your authentication code along with your login credentials. Continue reading to learn about the downsides of Google Authenticator and why Keeper Password Manager is the better choice.

Children's Hospital Cyberattack Compromises Sensitive Medical Data

A recent cyberattack on Lurie Children's Hospital in Chicago has resulted in a significant data breach, exposing the personal information of 791,000 patients. Despite the hospital's refusal to pay a ransom, a vast amount of sensitive medical data is now at risk. Details of the Attack The cybercriminals infiltrated the hospital's systems, causing severe disruptions to its patient portal, communications, and access to medical records.

Alerts on Policy Breaches Now Available via API

All Surface Monitoring users can configure Attack Surface Policies directly from the new Domains page, enabling various combinations of characteristics that were previously unavailable. Users are now alerted when policy breaches occur directly through their integrated tools, such as Slack and Jira.

Five key takeaways from Outpost24's Cyber Resilience Day 2024

Held in Breda, Netherlands, this year’s Cyber Resilience Day convened industry leaders and cybersecurity experts to address the topic of supply chain attacks and the latest digital threats. The event showcased a series of keynote speeches, panel discussions, and interactive workshops, equipping attendees with valuable insights and actionable strategies to strengthen their organizations’ cyber resilience.

From skeptic to advocate: My journey to embracing AI

For years, we as security practitioners were promised that AI and machine learning would change our lives for the better, but time and time again, the companies that touted this technology disappointed us. In the first decade or so of AI-branded security tools, we saw plenty of products that demoed well, but were completely undeployable.

CVE of the month, the supply chain vulnerability hidden for 10 years CVE-2024-38368

For over a decade, a massive vulnerability that could have unleashed a huge supply chain attack lay dormant. Luckily the good guys found it first or so it seems. This month we are taking a look at CVE-2024-38368.