Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Financial Business and Consumer Solutions Data Breach

Financial Business and Consumer Solutions (FBCS) was founded in 1982 as Federal Bond Collection Services and currently has over 100 employees. Based in Pennsylvania, the name was later changed in 2014. The company is a licensed debt collection agency offering specialized solutions for creditors across various product verticals to meet their diverse needs. Such creditors include those playing in healthcare, consumer credit, utilities, auto, and education services.

Ransomware Attacks: Held Hostage by Code

Data is among the most valuable assets for companies, making it a prime target for malicious actors. Ransomware attacks that seize data and demand a price for its return have become a significant concern for businesses and individuals. According to the Verizon 2024 Data Breach Investigations Report, about one-third of all breaches involved ransomware or another extortion technique. Here’s everything you need to know about ransomware and how to prevent a successful attack.

Securing AI-Enhanced Applications: Zenity's Role in Low-Code/No-Code Development

The rapid rise of low-code and no-code platforms has democratized application development, enabling even non-technical business users to swiftly create critical business applications. However, this accessibility brings new security challenges, particularly with the integration of AI technologies such as copilots, which are used to automate tasks and enhance functionality within these platforms. Zenity enhances the security of these AI-integrated environments by managing and securing AI copilots.

OpenSSH regreSSHion Vulnerability - The 443 Podcast - Episode 296

This week on #the443podcast, Corey Nachreiner and Marc Laliberte cover OpenSSH's recent critical vulnerability and what it means for systems administrators. Before that, we discuss the CDK Global ransomware attack impacting car dealerships across the U.S., a Korean internet service provider delivering malware to their customers, and a takeover of a popular JavaScript library gone hostile.

Defense Supply Chain Data Security

The defense supply chain is a complex network of partners that sell, manufacture, and distribute services or products to defense agencies worldwide. It is made up of both major corporations and smaller sub-suppliers. Each country has its own network of supply chain partners, including manufacturers, software, services and logistics providers that deliver products and services for military materiel applications.

How to build and launch an efficient and flexible blockchain payments solution

Your organization has identified a business and revenue opportunity to incorporate blockchain into your offering (or maybe launch a new product line that involves digital assets), and now you’re ready to implement this technology into a product offering. The question now is, “Where do we begin?” Ideally, your team will be working with partners and products that can easily fit into your existing tech stack and operational workflows.

Quantifying the Probability of Flaws in Open Source

Jay Jacobs and I recently delivered an RSA presentation called Quantifying the Probability of Flaws in Open Source. Since many people didn’t get a chance to see it, I thought I’d summarize some of the findings here for posterity. The question we investigated was simple, at least conceptually: what are the red flags of an open-source repository? Are there characteristics of a given open source library that would reliably indicate it was safer than others?

The Importance of Strong Passwords in 2024

Strong passwords are more important than ever in 2024 because they are the first line of defense against cyber attacks. While some companies have started to introduce passkeys to strengthen and expedite the login process, strong passwords are still needed when creating most accounts. A passkey replaces a username and password and has built-in Multi-Factor Authentication (MFA) by design. Strong passwords have been the foundation of any account, and in 2024, they will remain important.

Maximising Security Investments: A CISO's Guide to Budget Optimisation & Technology Consolidation

Economic pressures have been leading to greater budget scrutiny and justification of resources for cybersecurity teams. Boards are asking harder questions around cyber risk and exposure. Not only are CISOs working hard to justify and measure their program, they’ve had to become more data-driven in the way they align investments towards company outcomes and business objectives.