Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Do we really need another cybersecurity tool?

Research shows many companies now own and operate more than 60 disparate security tools, yet breaches continue to make headlines. Throwing more tools at the problem is a tactic that simply doesn’t work and— with trends pointing toward tighter security budgets—may not even be possible anymore. Security leaders are now in a position that requires them to ask tough questions and carefully scrutinize new security tools before pulling the trigger on purchases.

3 Types of Privileged Accounts to Secure in a Transforming Enterprise

For security teams managing their enterprises’ privileged access management (PAM) programs, times have changed and what’s considered a privileged or high-risk account has drastically shifted. In turn, the way organizations not only manage privilege, but comprehensively secure it, must also shift. Historically, organizations have managed their PAM programs by vaulting and rotating credentials on privileged accounts.

How to Respond to CVE-2023-24489 Impacting Citrix ShareFile

CISA added CVE-2023-24489 to the Known Exploited Vulnerabilities Catalog in August 2023. CVE-2023-24489 is an access control vulnerability impacting the use of Citrix ShareFile StorageZones Controller version 5.11.24 and below. Citrix ShareFile is a real-time collaboration platform. While ShareFile primarily offers a cloud-based file-sharing application, there are some features that accommodate data storage through the use of a storage zone controller.

Over 95k M&T Bank Customers Lose Data in Recent Breach

M&T Bank was established in 1856 and is one of the largest banks in the US. It is based in Buffalo, New York, and currently has over 1,000 branches in 12 separate states. The bank houses data for hundreds of thousands of individuals, and some of that information may be at risk because of a recent breach. Learn all about the 2023 M&T Bank data breach below.

GDPR and Biometric Data: Ethical Considerations and Privacy Implications

As technology advances and the use of biometric data becomes more prevalent, it is crucial to address the privacy concerns and regulatory compliance associated with this sensitive data. The General Data Protection Regulation (GDPR) plays a key role in safeguarding individuals’ privacy rights and ensuring the responsible handling of biometric data. Artificial Intelligence (AI) can also be utilized to ensure compliance and responsible handling of biometric data.

Vulnerability management: traditional approaches vs. risk-based strategies

As the threat landscape evolves, so must the methods and tools to safeguard critical digital assets. Vulnerability management programs that were once considered the gold standard are starting to show limitations in their ability to address complex cyber risks.