Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Dick's Sporting Goods Cyber Attack Underscores Importance of Email Security and Internal Controls

The recent cyber attack on Dick's Sporting Goods makes it clear that email played a critical role and emphasizes the need for better security controls. Dick’s Sporting Goods is a $12 billion company with more than 800 stores across the United States. That measure of success made the retailer the target of a recent cyber attack. A filing with the U.S.

From Desire Paths to Security Highways: Lessons from Disney's Approach to User-Centric Design

When Walt Disney first unveiled the Magic Kingdom, he made a decision that would revolutionize theme park design - and inadvertently offer a valuable lesson for cybersecurity professionals. Instead of pre-determining where visitors should walk, Disney let guests create their own paths. Only after observing these "desire paths" did Disney pave the official walkways. This approach, seemingly simple, carries profound implications for how we should approach security in our organizations.

Understanding EAR Compliance Regulations: Tips for US and non-US Companies

Coauthored with Eva Galfi, CEO & Principal Consultant, International Trade Advisors Pty Ltd The Department of Commerce’s Bureau of Industry and Security (BIS) implements and enforces the Export Administration Regulations (EAR) to regulate the export, reexport and transfer (in-country) commercial and less sensitive military items. If you need to comply with or learn more about US export control requirements, read our 6 W’s EAR Compliance to help you comply with these strict U.S.

What To Do if a Scammer Has Your Phone Number

If a scammer has your phone number, you should lock your SIM card, secure your online accounts with strong passwords and block spam calls from your phone. With your phone number, scammers can do several things, including target you with phishing attacks, spam calls, spoofing attacks and SIM swapping. These kinds of cyber attacks can lead to your personal information being compromised and even your identity being stolen.

Harnessing the Power of eBPF for API Traffic Analysis with Salt Sensor 3.0

As API usage grows, so do the complexities of securing them. At Salt Security, we're constantly striving to stay ahead of the curve and bring you the best-in-class solutions for API traffic analysis. With that mission in mind, we are thrilled to announce the release of Salt Sensor 3.0.0, packed with exciting new features to enhance your ability to capture and analyze API traffic.

Major Database Security Threats and How to Prevent Them

Human nature tells us that we’ll go for the low-hanging fruit before climbing a tree. Since threat actors are (after all) human, the same applies to them. Since databases are particularly vulnerable to many lower-level attacks, they are constantly at high risk. From misconfiguration to credential theft, these repositories of sensitive information can be preyed upon by even the most nascent cybercriminals.

Opti9 Receives AWS Resilience Competency

As of Monday, September 16th, Opti9 Technologies is proud to have achieved the AWS Resilience Competency, specialized in Resilience Recovery, recognizing our expertise in helping customers enhance the availability and reliability of their critical cloud workloads. As an AWS Resilience Competency Partner, our services are rigorously validated by AWS to ensure we meet the highest standards as an AWS Services Partner, and uphold the established expertise.

Board Responsibilities for Data Security and Privacy

Corporate boards are tasked with ensuring that sensitive information—ranging from intellectual property (IP) and end-user information to sales statistics—is handled securely. As data becomes an ever-more valuable asset, so too do the risks associated with mismanagement.