Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

A Comprehensive Guide to Today's IGA Solutions: Features, Benefits, and Options

Let’s face it. Managing and securing IT networks is far more complex today. Beyond securing endpoints, sensitive data, and the network perimeter, security teams must also focus on identity security, access management, and regulatory compliance. They not only have to create password policies but protect those passwords and access privileges. Twenty years ago, no one had to worry about things such as cloud identity. Today, a different world demands a different set of tools.

How to Automate PowerShell Scripts with Task Scheduler

Windows Task Scheduler enables users to schedule tasks to run at a specific date and time, on a defined schedule, or when triggered by certain events. This built-in tool of Windows operating systems helps improve efficiency and ensure reliable execution of repetitive tasks. In this blog, we will show you how to run a PowerShell script from Task Scheduler and how to create scheduled tasks using PowerShell.

Focusing on the WHY: Jit Enables Developers to Understand the Runtime Context for Security Issues

While code and cloud security scanners are great at identifying code flaws and cloud misconfigurations, they can bombard developers with long lists of potential security “issues” – many of which don’t introduce real risk. Whether insecure code introduces real risk depends on a number of factors, like whether it is being deployed to production, is exposed to the internet, or calls a sensitive database.

Datadog On Secure Remote Updates

In modern dynamic environments there is a requirement to be able to quickly respond to signals and change the configuration of your applications and systems. As Datadog supports an ever widening set of customer use cases, it has become necessary to allow for updates to systems directly from Datadog's platform. In this session, host Rory McCune (Senior Advocate) will be joined by Arthur Bellal (Staff Engineer) and Paul Coignet (Software Engineer II) from the fleet automation team to discuss how Datadog approached the challenge of building out a secure remote update facility.

New Ransomware Threat Group, RansomHub, is so Effective, the NSA is Already Warning You About Them

The latest evolution of the ransomware service model, RansomHub, has only been around since February of this year, but its affiliates are already successfully exfiltrating data. You know you’re a problem when the U.S. government puts out a notice about you. That’s the case for RansomHub — the latest iteration of a ransomware as a service group formerly working under the names Cyclops and Knight.

BEC Scams Have Caused $55 Billion in Losses Over the Past Ten Years

Business email compromise (BEC) attacks have caused more than $55 billion in losses between 2013 and 2023, according to an advisory from the U.S. Federal Bureau of Investigation (FBI). “The BEC scam continues to target small local businesses to larger corporations, and personal transactions while evolving in their techniques to access those business or personal accounts,” the FBI says.

Authorized Push Payment Fraud Responsible for Over Half of U.K. Frauds and Scams

Research from The Financial Ombudsman Service, a U.K. based organization dedicated to helping citizens with free financial advice, has found an increase in Authorized Pushed Payment (APP) scams. These attacks are rising both in number and sophistication. The Financial Ombudsman Service is a U.K. organization dedicated to helping residents with all things financial-as-a-free service. As part of this service, they take in a large number of complaints around financial fraud.

Common security testing approaches leave gaps. Here's how to find them.

Gaps in your security testing program are likely more than simply missed assets. Infrequent testing and even low test accuracy are also gaps, and can be just as bad or worse. Gaps happen despite the best efforts of everyone involved. The good news is that, with some strategic adjustments, you can reduce gaps using tools you likely already have deployed.

NCSC sets out plans to launch Advanced Cyber Defence 2.0

An initiative of the National Cyber Security Centre (NCSC) since 2017, the Active Cyber Defence (ACD) programme has provided a range of free cyber security tools and services to enable eligible public sector organisations to address high-volume commodity attacks. Following on from its success, the NCSC has announced plans to launch a new version of ACD, aimed at extending its benefits to businesses.