Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

The Essential Guide to Cyber Risk Quantification

Have you ever built software without encountering a single vulnerability? Unlikely. Vulnerabilities are an unavoidable fact of DevSecOps life, and the stakes are higher than before. Cybercrime expenditures are expected to exceed $9.5 trillion globally. Cyber risk quantification has become the need of the hour, not just for security teams and executives but also for developers.

Retail Threat Landscape 2024

The United States, is a prime target for cyber attacks. The U.S. retail sector, which holds nearly one-third of the global market share, has seen a significant rise in ransomware incidents, accounting for 45% of global retail ransomware cases in the past three quarters—a 9% increase from 2023. New groups like Ransomhub and Hunters have emerged and supply chain threats have increased. Social engineering tactics are on the rise, with attackers impersonating IT personnel.

CrowdStrike Strengthens SMB Security with Seamless Mobile Protection

Small and medium-sized businesses (SMBs) face many of the same cybersecurity threats as large enterprises but often lack the resources to maintain robust security across all devices. As SMBs rely on a growing number of smartphones and tablets, they must defend against a range of mobile-focused cyberattacks. The need for comprehensive security has never been more urgent.

Smart Year-End IT Investments- A Trifecta for ROI

As the year wraps up, many IT, security, compliance, and HR teams have unspent budgets that won’t roll over. Rather than scrambling for last-minute, low-value purchases, why not make smart, strategic investments that will pay dividends in 2025 and beyond? Are you concerned about—reducing insider risk, increasing workforce productivity, and guarding against compliance fines?

How Are You Covering These New DORA ICT Resilience Requirements?

DORA’s public consultation period is over. If your organisation deals with the finances of people or other entities based in the EU or provides services to a firm that does, you will want to know how its rule set has changed. We’ve read through the Digital Operational Resilience Act (DORA) documentation and kept up to speed with the latest EU FSI regulation memos. The bottom line is that DORA remains a very demanding regulation with a huge scope.

EP 66 - Post-Election Insights: AI, Misinformation and Security

In this episode of Trust Issues, host David Puner interviews James Imanian, Senior Director of the U.S. Federal Technology Office at CyberArk. They discuss the critical topic of election security, focusing on the recent 2024 U.S. presidential election. Drawing from his extensive background in cybersecurity including a career in the Navy and a stint at the U.S.

Gift or Grift? How Retailers Can Combat Cyber Threats This Season

A lot goes into deciding what to buy during the holiday shopping season – shipping times, sale prices, and finding the perfect gift for your niece (who is impossible to shop for) are likely to be at the top of your mind. Unfortunately, attackers are counting on that. An attacker’s best friend is urgency and Black Friday kicks off a perfect season for them.

Mastering Privileged Account and Session Management: 6 Best Practices to Implement in Your Organization

Cybercriminals will often target an organization’s privileged accounts, which provide a pathway to highly valuable assets. If compromised, privileged accounts and sessions can be used for malicious activity, potentially causing cybersecurity incidents. These incidents may lead to operational disruptions, financial losses, compliance issues, and reputational damage.

PowerShell Write to File: "Out-File" and File Output Techniques

Anyone familiar with PowerShell knows that the output of PowerShell commands is displayed in the terminal by default. However, there may be situations where you would want to redirect or save output to a file. In short, redirecting or saving PowerShell output increases productivity, helps with debugging, provides useful logs, and facilitates automation, especially in complex workflows or when working with large datasets.