Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

[New & Improved] QR Code Phishing with Snail Mail Postcards

One of KnowBe4's long-term employees just send me a picture this morning of a postcard that sure looks like it's phishing, the good old-fashioned way: snail mail! Here is the picture and you tell me what all the red flags are! The domain does not work of course. The email seems to have disappeared into the bitbucket. For many obvious reasons i have not tried the QR code since I do not have a bulletproof sandbox installed on my smartphone where I can detonate malware. :-D.

The Cyber Essentials 2023 update - what's involved?

The National Cyber Security Centre (NCSC) describes this update, version 3.1, as a ‘lighter touch’ update than the previous iteration in 2022, but it still contains some important updates and clarifications. In this blog post, we provide a brief overview of some of the changes. Cyber Essentials is an initiative created with the aim of increasing awareness of cyber security issues and enabling companies to address common types of cyber threats.

The Power of Using Risk Scores to Automate Continuous Conditional Access

Co-authored by David Willis and Gary Jenkins As we wrote in an earlier blog, the concept of cybersecurity risk continues to be codified, qualified, and, finally, quantified. With the rise of RESTful API endpoint support and near-real time telemetry sharing, companies can seize the opportunity to automate the IT/security stack’s response to risky users (in addition to devices, data, and applications—to be covered in future blogs).

The Top 4 Criteria for Choosing a Security Automation Solution

As businesses continue to evolve, automation has become an essential aspect of modern operations. The benefits of automation are numerous, ranging from reducing operational costs to increasing security, efficiency, and accuracy. However, with so many automation solutions available on the market, it can be challenging to select the right one for your business.

Platform Engineering and Security: A Very Short Introduction

Is DevOps really dead? Learn about the rise of platform engineering and how it differs from DevOps in terms of self-service capabilities and automation. Discover how security fits into this new paradigm and the benefits of platform engineering for software development teams of various sizes.

What are SafeNet Luna Network HSM 7 and Thales Luna Network HSM 7?

We will dive into the world of Luna Network HSM 7. You can explore its capabilities and the two options available: SafeNet Luna Network HSM 7 and Thales Luna Network HSM 7. Also, discover how these solutions enhance security and protect your cryptographic keys.

CA/B Forum Baseline Requirements v2.8 for Code Signing Certificates

Under the CA/B Forum BRs for Code Signing Certificates v2.8, Sectigo Certificate Services has implemented a hosted key attestation service to ensure the verification of hardware-backed keypairs during the issuance and management of Code Signing Certificates.

Sharing your business's data with ChatGPT: How risky is it?

As a natural language processing model, ChatGPT - and other similar machine learning-based language models - is trained on huge amounts of textual data. Processing all this data, ChatGPT can produce written responses that sound like they come from a real human being. ChatGPT learns from the data it ingests. If this information includes your sensitive business data, then sharing it with ChatGPT could potentially be risky and lead to cybersecurity concerns.

Unlocking Key Insights and Use Cases of Data Orchestration in Identity Verification Solutions

Business Insider reports that the identity verification market is anticipated to reach a value of $12.8 billion by 2024 as a result of the rising amount of digital transactions that require precise and trustworthy identification data. However, a lot of individuals don’t comprehend what identity entails. Identity is more complicated than it first looks since it can vary based on the setting and sector. For the various sources of identification data to be combined, data orchestration is essential.