Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Web Application Security 2021: Beginners Checklist to Get Started

Who can deny the importance of security for their website or online store? You may have already implemented some security measures, and you can feel quite complacent about it, but they are far from enough when we consider the security challenges. In recent years, even many leading websites and web apps faced a huge surge of security attacks on their websites.

Colonial Pipeline Hack - What Can We Learn?

It has been reported that the hack that took down the largest fuel pipeline in the United States and led to fuel shortages across the whole of the East Coast was the result of a single compromised password that was leaked on the Dark Web through a data breach. On April 29th 2021, hackers gained access to the network of Colonial Pipeline Co. via a Virtual Private Network (VPN) connection that allowed the hacker remote access to the corporate network.

The Principle of 'Least Privilege' in the World of Cybersecurity

The principle of least privilege in cybersecurity prescribes that no user should have access to system resources beyond what’s necessary for fulfilling a specific task. Adhering to this principle has become essential, as one of the primary ways malicious actors breach a system is by compromising (legitimate) user access.

The Many Challenges of a CISO - The ClubCISO 2021 Information Security Maturity Report

We all have heard and read how the pandemic has disrupted our lives, how it has accelerated digital transformation to an unprecedented extent and how it challenged the existing security policies and practices. The question is how the people responsible for fortifying their organizations experienced the whole situation.

EO, EO, It's Off to Work We Go! (Protecting Against the Threat of Ransomware with Splunk)

On June 2nd, 2021, the White House released a memo from Anne Neuberger, Deputy Assistant to the President and Deputy National Security Advisor for Cyber and Emerging Technology. The subject? “What We Urge You To Do To Protect Against The Threat of Ransomware.” It outlines several recommendations on how to protect your organization from ransomware. The memo was a follow-up to President Biden’s May 12th Executive Order on Improving the Nation’s Cybersecurity Order (EO14028).

Protecting a New Vulnerable Population on the Internet

Abraham Lincoln is credited with saying that “A lawyer’s time and advice are his stock and trade.” Whether the quote is mis-attributed to Lincoln is irrelevant to the greater message, which is that attorneys are “knowledge workers.” To state it as bluntly as one attorney once explained to an executive where I worked, “My knowledge will keep you out of jail.” As a cybersecurity professional, you too are a knowledge worker.

Securing Computerized Vehicles from Potential Cybersecurity Threats

Like technology itself, cybersecurity is ever-evolving and encompassing more areas of our lives, including transportation. Popular science fiction movies have led us to expect flying taxis and private space travel as the future of transportation. If that is going to become an eventual reality, the first steps towards that future are “smart cars” and automated vehicles. Electric vehicles are expected to account for 58% of global passenger vehicle sales by 2040.

What is Enterprise Digital Rights Management (EDRM)?

EDRM sometimes referred to as Information Rights Management (IRM) is a core-data-centric technology that offers uninterrupted protection to unstructured data. It protects sensitive information/data everywhere by managing and enforcing access and usage rights to the information throughout its lifecycle, no matter where the information is distributed. EDRM controls how employees and partners use sensitive information.