Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Blogs

Common security testing approaches leave gaps. Here's how to find them.

Gaps in your security testing program are likely more than simply missed assets. Infrequent testing and even low test accuracy are also gaps, and can be just as bad or worse. Gaps happen despite the best efforts of everyone involved. The good news is that, with some strategic adjustments, you can reduce gaps using tools you likely already have deployed.

Authorized Push Payment Fraud Responsible for Over Half of U.K. Frauds and Scams

Research from The Financial Ombudsman Service, a U.K. based organization dedicated to helping citizens with free financial advice, has found an increase in Authorized Pushed Payment (APP) scams. These attacks are rising both in number and sophistication. The Financial Ombudsman Service is a U.K. organization dedicated to helping residents with all things financial-as-a-free service. As part of this service, they take in a large number of complaints around financial fraud.

BEC Scams Have Caused $55 Billion in Losses Over the Past Ten Years

Business email compromise (BEC) attacks have caused more than $55 billion in losses between 2013 and 2023, according to an advisory from the U.S. Federal Bureau of Investigation (FBI). “The BEC scam continues to target small local businesses to larger corporations, and personal transactions while evolving in their techniques to access those business or personal accounts,” the FBI says.

New Ransomware Threat Group, RansomHub, is so Effective, the NSA is Already Warning You About Them

The latest evolution of the ransomware service model, RansomHub, has only been around since February of this year, but its affiliates are already successfully exfiltrating data. You know you’re a problem when the U.S. government puts out a notice about you. That’s the case for RansomHub — the latest iteration of a ransomware as a service group formerly working under the names Cyclops and Knight.

Focusing on the WHY: Jit Enables Developers to Understand the Runtime Context for Security Issues

While code and cloud security scanners are great at identifying code flaws and cloud misconfigurations, they can bombard developers with long lists of potential security “issues” – many of which don’t introduce real risk. Whether insecure code introduces real risk depends on a number of factors, like whether it is being deployed to production, is exposed to the internet, or calls a sensitive database.

How to Automate PowerShell Scripts with Task Scheduler

Windows Task Scheduler enables users to schedule tasks to run at a specific date and time, on a defined schedule, or when triggered by certain events. This built-in tool of Windows operating systems helps improve efficiency and ensure reliable execution of repetitive tasks. In this blog, we will show you how to run a PowerShell script from Task Scheduler and how to create scheduled tasks using PowerShell.

A Comprehensive Guide to Today's IGA Solutions: Features, Benefits, and Options

Let’s face it. Managing and securing IT networks is far more complex today. Beyond securing endpoints, sensitive data, and the network perimeter, security teams must also focus on identity security, access management, and regulatory compliance. They not only have to create password policies but protect those passwords and access privileges. Twenty years ago, no one had to worry about things such as cloud identity. Today, a different world demands a different set of tools.

Navigating the Cloud Chaos: 2024's Top Threats Revealed

Misconfigurations (when cloud computing assets are set up incorrectly, leaving them vulnerable to unauthorized access, data breaches, and operational disruptions) and inadequate change control top the list of cloud security threats in 2024, rising from third place the year before. It's clear that the transition to cloud computing has amplified the challenges of configuration management, making it critical for entities to adopt cloud-specific configurations.

Mitigating Alert Fatigue in SecOps Teams

Security Operations Teams (SOCs) today are under attack by the very mechanisms meant to help them. A recent industry study revealed a few startling facts: And unsurprisingly, the vast majority (80%) say that manual processes are slowing them down. These stats lay out both the problem with and solution to alert fatigue today: too many alerts, too many bad ones, and not enough streamlined processes helping SOCs get ahead of the problem.

How to Build a Cyber Security Culture?

Cybersecurity is no longer an awareness issue but a strategic execution problem. In 2023, 96% of CEOs acknowledged cybersecurity’s importance for organizational growth, stability, and competitiveness, but only 15% had dedicated board meetings to discuss cybersecurity issues. This disconnect between awareness and action stems primarily from difficulty quantifying cybersecurity goals, investments, and return on investment (ROI), making it easier to overlook or, at best, an afterthought.