Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Continuous governance provides a comprehensive strategy across your entire organization

In our previous blog, we touched on how your current identity governance access review processes and workflows may be a major factor in spreading identity fatigue across your organization. In this blog, let’s talk about how you can extend your identity governance far beyond identities and entitlements to protect/secure privileged access, applications, cloud infrastructure and all your critical data.

Are You Prepared for Hurricane Season?

It’s June, and you know what that means. Beach days and barbecues? No, unfortunately, we’re not here to celebrate the start of summer. There’s another — much less pleasant — season afoot. Hurricane season. For the next sixth months, businesses operating along the Southern and Eastern Atlantic coast will hold a collective breath. And for good reason.

A Guide to Handling the MOVEit Attack

Last week, a vulnerability in the popular MOVEit managed file transfer service was exploited by the CL0P ransomware gang to execute data breaches – an increasingly common cybersecurity attack technique where popular software is exploited to target, by extension, their users. Victims of this hack include British Airways, Boots, BBC, and multiple US government agencies.

The Security Posture Checklist: Tips for Strengthening Your Digital Defenses

As a Chief Information Officer, CISO, Security Director, or CEO of any organization, leaving your digital defenses vulnerable to data breaches comes with costly risks. From the potential for customer data theft and extensive damage to your industry reputation—it’s critical that you take proactive security measures to ensure a strong security posture.

How to Secure Your CI/CD Pipelines with GitGuardian Honeytokens

Discover how honeytokens, digital decoys designed to detect unauthorized access, can strengthen the security of your CI/CD pipelines. In this guide, we offer step-by-step instructions for integrating them into popular pipelines like Jenkins, GitLab, and AWS CodePipeline.

NIST Cybersecurity Framework 2.0 (NIST CSF 2.0)

In 2014 and with extensive community involvement NIST Cybersecurity Framework was created for private sector organizations in the United States. It is also aligned with other NIST standards and guidelines, such as NIST 800-53 and FedRAMP. NIST Cybersecurity Framework (CSF or Framework) is intended to be a living document that is refined and improved over time and was updated in 2018 and called CSF 1.1. We will be discussing NIST CSF 2.0.

Cybercriminals Spoof German Media Anga Com Conference in New Phishing Campaign

A phishing campaign is spoofing the major German media conference Anga Com, according to Jeremy Fuchs at Avanan. “A central part of any conference for a company is to garner interest for their company,” Fuchs explains. “Many conferences will give over lead lists for companies to follow up on. This can be a significant source of potential revenue for companies. This is not the usual fare for hackers.

France Accuses Russia of Spoofing Foreign Ministry Website in 'Typosquatting' Campaign

The French government is taking a stand against the increasing threat of digital warfare. Publicly accusing Russia of conducting an extensive online manipulation campaign, France is fighting back against typosquatting of major media outlets and the French Foreign Ministry. The goal of these fake websites is to spread disinformation and confusion about the ongoing war in Ukraine.

Takeaways From a Threat Intelligence Specialist on Artificial Intelligence Being a 'Double-Edged Sword'

While artificial intelligence (AI) has been the hot topic of this year, a theme that I continue to see is that AI is being used for good and evil. I'm going to dive more into key takeaways your organization can learn from Catherine Williams, Threat Intelligence Specialist at Telecom giant BT. Get her insights on AI being on two sides of the battlefield, and why everyone should start integrating cybersecurity in their everyday tasks now.

CVE-2023-34362 - Zero-Day Vulnerability Discovered in MOVEit Transfer is Exploited in the Wild by Cl0p Ransomeware - Here's What you Need to Know

On May 29, 2023, a critical security vulnerability, identified as CVE-2023-34362, was published, leaving users of MOVEit Transfer software at high risk. According to Progress, organizations have reported possible exploitation in the wild. Therefore it’s crucial that any business using MOVEit Transfer to take immediate action, especially since all versions of this popular file transfer software are affected by this vulnerability.