Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Disable Data Execution Prevention

Data Execution Prevention (DEP) is a Windows security feature that protects systems by preventing code from executing in memory areas designated for data storage. By ensuring only authorized programs can run in specific memory regions, DEP helps block malicious software, such as viruses, from executing harmful code. It operates at both hardware and software levels, monitoring memory usage to prevent exploits like buffer overflow attacks.

Cyber Essentials certification cost and related expenses: A detailed breakdown

The Cyber Essentials assurance scheme is one of the best accreditations you can obtain for improving your organization's cybersecurity posture and reducing the risk of cyberattacks. It offers a robust set of controls you can implement to fortify the security of your data, systems, and other IT assets and build greater trust with your stakeholders.

CVE-2024-47610: Stored XSS Vulnerability in InvenTree

Astra Security identified a vulnerability in the InvenTree Inventory Management System on October 2nd, 2024, which has since been patched. This vulnerability, CVE-2024-47610, is stored cross-site scripting (stored XSS) that targets versions of InvenTree below 0.16.5, where ‘Markdown,’ in the Notes feature, can enable attackers to run code. Cross-site scripting vulnerabilities allow a hacker to inject HTML code into an application and affect the users who intercept the code.

Introducing Landscape Mode, Passphrases and Other Improvements to KeeperFill

Introducing Landscape Mode, Passphrases and Other Improvements to KeeperFill Intro KeeperFill is Keeper’s powerful, autofilling feature that works across all devices, allowing you to automatically and securely fill your usernames, passwords, passkeys, 2FA codes and more into the sites you visit.

Who's Responsible for Your Security?

Antivirus, malware protection, email security, EDR, XDR, next-generation firewalls, AI-enabled analytics – the list of protective controls and vendors appears to go on forever. Each day, bad actors discover new attack vectors that provide them with new roads to create chaos and destruction. News of data leaks, breaches and exposures has reached the point where it leaves most people numb and apathetic.

EP 63 - Jailbreaking AI: The Risks and Realities of Machine Identities

In this episode of Trust Issues, host David Puner welcomes back Lavi Lazarovitz, Vice President of Cyber Research at CyberArk Labs, for a discussion covering the latest developments in generative AI and the emerging cyberthreats associated with it. Lavi shares insights on how machine identities are becoming prime targets for threat actors and discusses the innovative research being conducted by CyberArk Labs to understand and mitigate these risks.

Implementing Organizational Segmentation - RBAC - Tanium Tech Talks #106

Today we are getting into the weeds of implementing Tanium RBAC at scale - Role Based Access Control. What does it look like in real life? If you're a global company, a state government, any organization that has business units or agencies that needs separated duties and permissions within a single Tanium console, then this show is for you. The two-part RBAC episode #81 linked below is the pre-requisite for this video.

Cybersecurity Frameworks: What They Are & How to Use Them

With the easy availability of tools and knowledge, cyberattacks of all sorts are running rampant, putting pressure on organizations to better defend themselves. Security is a continuous process that grows over time — exactly why organizations need to create a strong foundation. Two important questions every organization has asked themselves are: Where do we start, and have we done enough?