Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Lessons from LastPass: The time when BYOD became BYOB (bring your own breach)

Unfortunately, for LastPass and its users, this nightmare became a reality in August 2022 when a developer account was compromised. This led to a series of events that ultimately led to the exposure of sensitive customer data. A hacker exploited an employee to access the company’s data. But get this: the hacker exploited a three-year-old vulnerability that wasn’t patched. That’s like leaving your front door wide open for three years and being surprised when a burglar walks right in!

The Weak Link: Recent Supply Chain Attacks Examined

Supply chain attacks are a growing and increasingly sophisticated form of cyber threat. They target the complex network of relationships between organizations and their suppliers, vendors, and third-party service providers. These attacks exploit vulnerabilities that emerge due to the interconnected nature of digital supply chains, which often span multiple organizations, systems, and geographies.

Oversight of Cyber Risk: The Board's Essential Role in Mitigation and Prevention

Cybersecurity has become a top-of-mind concern for many C-level executives and board members. Data breaches are a daily occurrence and carry a hefty — and growing — price tag averaging $4.35 million worldwide, according to the latest Cost of a Data Breach report. However, this is only one of several potential cybersecurity risks that an organization can face.

Securing the Edge Ecosystem Global Research released - Complimentary report available

AT&T Cybersecurity is committed to providing thought leadership to help you strategically plan for an evolving cybersecurity landscape. Our 2023 AT&T Cybersecurity Insights™ Report: Edge Ecosystem is now available. It describes the common characteristics of an edge computing environment, the top use cases and security trends, and key recommendations for strategic planning. This is the 12th edition of our vendor-neutral and forward-looking report.

Spring is the Perfect Season for a Digital Declutter

Spring is here! Who’s up for some digital spring cleaning? Digital de-cluttering helps you organize your life and has the bonus of reducing your vulnerability to common threats. But knowing where to begin can be hard; most of us leave a larger digital footprint than we realize. I have created a checklist to help you clear away the clutter and reap the rewards of a clean digital slate.

The K-12 Report: A Cybersecurity Assessment of the 2021-2022 School Year

The K-12 Report breaks down the cyber risks faced by public schools across the country and is sponsored by the CIS (Center for Internet Security) and the MS-ISAC (Multi-State Information Sharing & Analysis Center). Published “to prepare K-12 leaders with the information to make informed decisions around cyber risk”, the report provides a data-driven analysis of what went well, what could be better, and what exactly is threatening our K-12 schools.

Building a cybersecurity plan for the State and Local Cybersecurity Grant Program (SLCGP)

For state and tribal governments thinking about applying for — or that have already applied for — funding from the US federal State and Local Cybersecurity Grant Program (SLCGP) or Tribal Cybersecurity Grant Program (TCGP), you likely already know that building out a comprehensive cybersecurity plan is a required element in the process. If you’ve already submitted your application for fiscal year 2022 funding, you have until the end of September 2023 to submit your cybersecurity plan.

Early Warnings with LimaCharlie + Canarytokens

Here at LimaCharlie, we believe in utilizing as much telemetry as possible to gain insight into suspicious activity within your environment. Our platform allows for you to create or import detection rules, like Sigma or SnapAttack, quickly, so your team can get up and running. Wider visibility means higher fidelity detections. However, what if we could utilize a simple, yet effective, tool to provide an earlier warning of potential attacks? This is where Canarytokens come in.

Accelerate Your Security Transformation with Google Workspace and CrowdStrike

Each day, enterprise and public sector IT teams face new challenges when managing hybrid work for networks of hundreds, or even thousands, of users. A more distributed workforce means an increased reliance on collaboration and productivity tools. It also requires a strong strategy to protect these systems against vulnerabilities and modern cyberattacks.

Doubling Our Commitment To Our Customers With A $10 Million Ransomware Recovery Warranty

Cyber attacks have become inevitable. According to research from Rubrik Zero Labs, 99% of IT and Security leaders were made aware of a cyberattack against their organization in 2022 with an average of 52 cyberattacks in this category. On top of that, 96% of IT and Security leaders are concerned they will be unable to maintain business continuity if they experience a cyberattack this year.