Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Risk Management

Best Practices for Protecting Drone Data in Commercial Applications

Hey there, tech enthusiasts and masters of the skies! With the soaring ascent of drones in commercial applications, it's not just about nailing the perfect aerial shot anymore-it's also about locking down that precious data. Drones are busy bees, collecting loads of info that need protection just as much as any ground-based data trove. We've all heard the horror stories of data breaches resulting in hefty fines and reputational damage. That's why I'm here to guide you through the labyrinth of drone data security, helping your business keep its digital treasures under a virtual lock and key.

Understanding CVE-2024-47176: Mitigating CUPS Vulnerabilities

The Common UNIX Printing System (CUPS) is a widely used printing system on Unix-like operating systems, but recent vulnerabilities have exposed significant risks. The most critical is CVE-2024-47176, which affects the cups-browsed service by binding to the IP address INADDR_ANY:631. This configuration flaw causes it to trust all incoming packets, leading to potential remote code execution when interacting with malicious printers. This vulnerability is part of a chain of exploits, including.

Inside a North Korean Phishing Operation Targeting DevOps Employees

Sophisticated threat actors are increasingly targeting organizations with tailored phishing campaigns. Recently, SecurityScorecard detected a similar attempt against our team—and stopped it in its tracks. We’re sharing our findings to support the InfoSec community and strengthen collective defenses against continually evolving threats.

The Job Offer That Wasn't: How We Stopped an Espionage Plot

In cybersecurity, transparency matters—because none of us are immune. Increasingly, we’re seeing threat actors hone in on specific organizations. When we detected the recent “Contagious Interview” campaign targeting one of our own, our team acted fast to stop it in its tracks. We’re sharing this story so others can see how easily these attacks unfold—and how quickly they need to be stopped to protect the community.

Cost of Ignoring Data Replication: Risks for Modern Businesses

Data replication allows businesses to operate efficiently. The process involves copying data files across multiple systems or locations. At its core, replication prevents downtime and ensures data is synchronized in case of accidental deletion. However, this move could expose your business to risks like data inconsistencies, data loss, limited scalability, and compliance issues. This article will discuss the cost of ignoring data replication for modern businesses.

Unlocking the Potential of GRC Tools: A Path to Strategic Risk Management

By James Rees, MD, Razorthorn Security In today’s complex cybersecurity landscape, Governance, Risk and Compliance (GRC) tools have become essential for organisations managing intricate security ecosystems. These tools are designed to centralise information, streamline processes and offer crucial insights into an organisation’s risk posture. However, as cybersecurity expert Jack Jones revealed when he joined me on a recent podcast, the reality often falls short of these ambitious claims.

Introducing the Risk Management Dashboard

The Keeper Risk Management Dashboard is a powerful feature of the Keeper Admin Console that provides comprehensive security posture information covering end-user deployment, utilization, cloud configuration, and event monitoring. This critical data helps administrators ensure that risks are remediated and compliance is enforced effectively.
Featured Post

What Security Teams Need to Know About the EU's NIS 2 Directive

The deadline to get compliant with the EU's NIS 2 Directive is here. And this isn't just a minor update from its NIS 1 predecessor-it's a major expansion that carries with it new challenges and obligations. The directive now covers a whopping 300,000 organizations, up from just 20,000 under NIS 1. Sectors like aerospace, public administration, digital services, postal and courier services, and food production are now included. Organizations are classified into "essential" or "important" entities based on size and criticality to the economy.

How to Overcome the Security Questionnaire Burden

If you’re on the frontlines of your organization’s cybersecurity department, you’ve likely found yourself burdened by security questionnaires. Whether you’re in charge of evaluating vendor responses or completing questionnaires yourself, it’s no secret these requests can be time-consuming for everyone involved. Well, what if this didn’t have to be the case?