Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

User Access Review Template (with download)

“Your entire company network was compromised, all through a single login.” That’s the reality of an employee single sign-on (SSO) breach nightmare. Hackers create fake SSO login pages in order to steal employee credentials, which can literally give them “the keys to the kingdom” – access to the most sensitive data of the organization. From a disgruntled ex-employee to a compromised user, it can become a devastating security hole. It happens more than you think.

One Identity chosen as a leading IGA vendor for SAP transition

Larry Chinski, One Identity VP of Corporate Strategy, announces that One Identity was chosen as a leading vendor for SAP’s IGA customers, following SAP’s announcement of the end-of-life for SAP Identity Manager. One Identity Manager was selected as the IGA replacement solution for SAP customers due to its well-established market presence and robust SAP solutions support.

5 things you need to know to build a firewall for AI

Everywhere we look, organizations are harnessing the power of large language models (LLMs) to develop cutting-edge AI applications like chatbots, virtual assistants, and more. Yet even amidst the fast pace of innovation, it’s crucial for security teams and developers to take a moment to ensure that proper safeguards are in place to protect company and customer data.

The Race for Artificial Intelligence Governance

As AI adoptions become increasingly integral to all aspects of society worldwide, there is a heightened global race to establish artificial intelligence governance frameworks that ensure their safe, private, and ethical use. Nations and regions are actively developing policies and guidelines to manage AI’s expansive influence and mitigate associated risks. This global effort reflects a recognition of the profound impact that AI has on everything from consumer rights to national security.

Hardening Systems through Security Benchmarks

System hardening is the process of configuring a system to a more secure state. Many technology solutions are not securely configured by default, so system administrators must harden systems while retaining their desired functionality. Thankfully, system administrators do not have to figure out system hardening on their own. Instead, they can reference security benchmarks which describe recommended secure configurations for a system.

o9 Solutions: Optimizing Security Operations with Elastic

O9 Solutions leverages Elastic for both Observability and Security Operations Center (SOC) purposes. Initially employed for performance monitoring, Elastic's integration with O9's security stack has provided comprehensive visibility into potential threats and anomalies within their environment. This integration extends across various platforms such as Google, AWS, Active Directory, WEF, and HDR, enabling correlation and consolidated dashboard views for decision-making.

SafeBreach Coverage for AA24-131A (Black Basta Ransomware)

On May10th, Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), Department of Health and Human Services (HHS), and Multi-State Information Sharing and Analysis Center (MS-ISAC) issued an urgent advisory about malicious threat activity involving the Black Basta ransomware variant. Detailed information about these threats and the associated IOCs and TTPs can be seen on #StopRansomware: Black Basta.

Deciphering the SIEM Puzzle: How to Choose the Ideal Solution

Register for the Webinar Large-scale cyber breaches continue to dominate headlines, amplifying the damaging ramifications of failing to secure your organization. Even with a substantial investment in your SOC, outcomes continue to fall short of promises. Breaches lead to massive data leaks, steep financial losses, and tarnished reputations, underscoring the urgent need for effective SIEM technology.

AppSec spring cleaning checklist

Something about the springtime sunshine and blooming flowers inspires many of us to start cleaning. For some, it might be tackling the backyard shed that accumulated cobwebs over the winter or that overflowing junk drawer in the corner of the kitchen. As you survey your home and yard and decide where to start cleaning, it’s also a great time to look at your application security program and see if any of your existing processes need some tidying up. Here are a few great places to start.