Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What is a Code Signing within the Public Key Infrastructure (PKI)?

Public Key Infrastructure (PKI) is a fundamental backbone, empowering the seamless use of cutting-edge technologies like digital signatures and encryption across vast user populations. It encompasses a comprehensive suite of hardware, software, policies, processes, and procedures, working harmoniously to create, manage, distribute, use, store, and revoke digital certificates and public keys.

Weekly Cybersecurity Recap August 11

New companies are hurt by significant data breaches every week, especially in the United States. This week insurance companies were the big target. Prudential, Progressive, and a range of insurance providers that work with PH Tech were all hit by data breaches. Allegheny County, Pennsylvania, and the Colorado Department of Higher Education were also victims of their own data breaches. Millions of individuals were exposed to potential data losses between these different breaches.

Prudential Insurance Hit By MOVEit Breach Involving Over 320k Customers

Prudential Insurance Company of America is one of the largest financial services and insurance companies in the United States today. The organization is based in Newark, New Jersey, and manages over $1.377 trillion in assets for consumers in the US. The company employs over 39,000 workers and handles data for countless customers each year. Each of those customers was potentially damaged when Prudential suffered a serious data breach that released confidential information to attackers.

Image steganography: Concealing secrets within pixels

In the realm of information security and covert communication, image steganography serves as a powerful technique for hiding sensitive data within innocent-looking images. By embedding secret messages or files within the pixels of an image, steganography enables covert transmission without arousing suspicion. This article aims to delve into the world of image steganography, exploring its principles, techniques, and real-world applications.

Elevate your secrets security posture with GitGuardian Secrets Detection's latest releases

Detect real secrets, automate severity scoring, prioritize your efforts on your most critical incidents, fix faster with your developers' help, and get the support you deserve from our team of experts!

The NIS Directive: Enhancing Cybersecurity in the Digital Era

In 2016, the European Commission adopted the EU Network and Information Security (NIS) Directive. The directive aims to establish regulations that improve the overall cybersecurity level across Europe and was recently updated in January 2023 to a new directive called NIS2. The NIS Directive is a multifaceted legislation that applies to various industry sectors, providing regulations that help EU member states build strong cybersecurity postures.

7 Third-Party Risk Management Trends to be Aware of in 2024

Whether your organization is prepared or not, the risks associated with third-party partnerships will continue to increase. In 2022, approximately 1,802 data breaches exposed the information of more than 422 million individuals in the United States alone. While those numbers are enough to frighten any organization, many reports expect them to continue to rise throughout 2024.

Choosing Automated Vendor Risk Remediation Software (in 2023)

Vendor Risk Management is critical for reducing the impact of security risks associated with third-party vendors. But often included with this cybersecurity practice is a bloat of administrative processes that disrupt workflows and impact VRM efficacy, defeating the purpose of even having a VRM program. To establish a scalable Vendor Risk Management program, cybersecurity teams should take advantage of every opportunity to replace manual processes with automation technology.

Comcast: 9 out of 10 Attempts to Breach Customer Networks Start with a Phish

The latest data from Comcast Business’ analysis of over 23.5 billion cyber attacks on their business customers shows the importance and role of phishing in attacks. Over the years there has been a consistent mantra, where everyone agrees that “90-something” percent of cyber attacks start with phishing. There have been plenty of sources that corroborate this using percentages in the 90th percentile, but the overall message is phishing is your greatest Initial Access tactic.