Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Importance of the Golden Thread to Safely Design and Construct Buildings

Following the Grenfell Tower tragedy, the UK government commissioned Dame Judith Hackitt to conduct an independent review of building regulations and fire safety. In her report, "Building a Safer Future," Dame Judith proposed the use of a "Golden Thread" as a tool for managing buildings as holistic systems and enabling people to design, construct, and operate their buildings safely and efficiently.

Netskope Uses AI to Help Protect Sensitive Data Stored in Amazon S3 by AWS AppFabric

Spending for software-as-a-service (SaaS) applications is projected to grow 17.9% to $197 billion in 2023, then grow another 17.7% to $232 billion in 2024. This rapid growth is being fueled by several factors including the desire to modernize IT environments and enable hybrid workers, who might login from a branch office one day and a hotel room the next.

iOS Application Penetration Testing Checklist [153 Test Cases in a Free Excel File]

Get Free iOS Application Penetration Testing Checklist Apple’s recent release of iOS 16 for the iPhone brings important new security features. Despite the inherent security features of iOS, additional measures, techniques, and guidelines can be employed to fortify the protection of user data and ensure privacy. Having previously covered the Android penetration testing checklist and security assessment, it is time to focus on iOS.

California State Retirees Hit by Data Breach: More than 770,000 Impacted

Both CalPERS and CalSTRS are agencies that manage retirement funds and health benefits for retired California teachers, government employees, and more types of public service employees. These organizations handle a huge amount of personal and financial data for teachers and other individuals, and they even handle pensions for them. That's why it's so upsetting to learn that both CalPERS and CalSTRS were impacted by a recent data breach.

Be Smart About Attack Surface Management Automation

Smart automation in ASM refers to the application of intelligent and adaptive technologies and tools to automate the attack surface management process. By leveraging machine learning algorithms and artificial intelligence technologies, enterprises can automate discovery and threat exposure, drastically reducing the time and resources required for the process. They can also minimize false positives and false negatives.

Cyber Insurance Today: What's Covered (What Isn't), Insurance Types & Benefits of Opting In

Even with the best strategies in place, cyber professionals understand that it’s only a matter of when, not if, a cyberattack will happen. Hence, a risk management and incident response plan is necessary for an organization’s cybersecurity posture. While such plans won’t wipe out the financial and reputational aftermath of a cyberattack — a cyber insurance policy can help your organization recover from such attacks.

Data Exfiltration: Prevention, Risks & Best Practices

Imagine a scenario where a competitor gains access to your organization's most sensitive data, causing severe financial loss and irreparable damage to your reputation. This nightmare can become a reality through data exfiltration. Data exfiltration is a real threat to organizations, as it involves the unauthorized transfer of sensitive information, the effects of which can lead to operational disruption, financial losses and damage to reputation.

Threat Hunting with Splunk: Hands-on Tutorials for the Active Hunter

At Splunk, you may hear us pontificating on our ponies about how awesome and easy it is to use Splunk to hunt for threats. Why, all you need to do is use X and Y with Splunk to find a Z score (no zombies were injured) and BOOM! That baddie in your network is detected. Going back to at least a decade, we’ve tried to make it easy — as you’ll see in the resources below — and yet threat hunting is about as easy as telling someone how easy it is to draw an owl.

Compound Extortion: UnSafeLeaks

Among the range of data leak sites monitored by JUMPSEC, our attention has been drawn to a recent variant called “UnSafeLeaks”, due to its distinctively malicious and personalised approach, setting it apart from typical leak sites that focus primarily on explicit financial extortion. Perhaps more remarkably, a number of targeted organisations also appear to have previously been compromised by closely affiliated groups, suggesting the potential re-extortion of victim organisations.

Types of Multi-Factor Authentication (MFA)

The four types of Multi-Factor Authentication (MFA) are knowledge, possession, inherence and location. These authentication types provide a foundation for a number of MFA methods, giving users multiple options for securing their data, ranging from SMS message tokens to hardware security keys. Which method is right for you or your business can depend upon what you have access to and how secure you want to be.