Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Bringing the Light into the Dark Places: Invisible Threats, Visible Solutions

What is the biggest cybersecurity challenge facing companies worldwide? The answer may vary depending on who you ask, but one indisputable fact remains clear: “What you can’t see, can and will hurt you.” Cyber threats lurk in the depths of the digital world, constantly evolving, poised to strike unsuspecting victims. They often strike by compromising unseen connected devices which, experience has proven, represent up to 50% of all devices on a network.*

Insights from the NSA 2023 Cybersecurity Report

The digital landscape is ever-changing, causing cybersecurity to often feel like a moving target. Thankfully, the NSA 2023 Cybersecurity Report arrives to provide critical information and context to help organizations keep their peace of mind. This comprehensive report, drawing insights from a wide range of industries, delves into the pressing technological trends, emerging challenges, and the growing importance of sustainability in the tech sector.

Data Brokering: A Thousand Things About Yourself

A recent report from Duke University's Sanford School of Public Policy has shed light on a concerning issue - data brokers are selling vast amounts of highly sensitive information about American military service members. This includes private data about active-duty personnel, veterans, and their families, encompassing sensitive health and financial details. Shockingly, these brokers even offer bulk data for individuals within geofenced military facilities like Fort Bragg and Quantico.

Managing Active Directory VPN via Security Groups

Virtual private network (VPN) is extremely valuable technology, especially for organizations with a remote or hybrid workforce. VPN provides users with a secure and encrypted connection so they can access the corporate network over the internet — while keeping your confidential data and sensitive systems safe from prying eyes. VPN can also hide your IP address so that you can visit websites that are not normally accessible from your location.

What To Look for in a PAM Solution

Organizations need a Privileged Access Management (PAM) solution to protect their privileged accounts from misuse and compromise. However, not all PAM solutions are created the same. Traditional on-premises PAM platforms can lack the features needed to provide a dynamic and secure solution. The key features to look for in a modern PAM solution include zero-trust security, cloud-based infrastructure, integration with native tools and easy deployment.

State-Sponsored Threat Actors Targeting European Union Entities With Spear Phishing Campaigns

Numerous state-sponsored threat actors frequently launched spear phishing attacks against European Union entities last year, according to a new report from the EU’s Emergency Response Team (CERT-EU). “In 2023, spear phishing remained the predominant initial access method for state-sponsored and cybercrime groups seeking to infiltrate target networks,” the report says.