Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CISO's Guide to Data-Driven Budget for Cyber Security Spend

‍ The global economic situation is far from encouraging. The IMF’s World Economic Outlook predicts growth will again fall by 3% in 2024 as central banks continue to fight inflation. Businesses throughout all industries are expected to tighten their budgets for the upcoming year, scrutinizing and slashing spending across departments. ‍ At the same time, recent research reveals that the global cost of cyber attacks is expected to reach $10.5 trillion annually.

Cyber Hygiene, Phishing, & Password Sharing: Tips from Cybersecurity Awareness Month 2023

As Cybersecurity Awareness Month 2023 draws to a close, we wanted to highlight some tips to keep in mind for the rest of the year, and beyond. In case you’ve missed it, we’ve been running a series of videos on our LinkedIn page throughout the month of October highlighting tips from members of our internal security team on topics like password sharing, keeping personal identifiable information safe, and maintaining good cyber hygiene.

TrustCloud Product Updates: October 2023

Our team has been hard at work creating updates and new features just for you, see what we’ve been up to over the last month. Beta Release: TrustCloud Third-Party Risk Assessments (TPRA) Managing and assessing vendors shouldn’t bog you down. TrustCloud TPRA helps you prove that your vendors meet your control requirements with less time and effort. Check it out!

Coffee Talk with SURGe: 2023-10-31 SEC SolarWinds Complaint, Biden's Executive Order on AI

Grab a cup of coffee and join Mick Baccio, Ryan Kovar, and Audra Streetman for a spooky Halloween edition of Coffee Talk with SURGe. The team from Splunk will discuss the latest security news, including: Mick and Ryan also competed in a charity challenge benefitting World Central Kitchen to share the lessons learned from Cybersecurity Awareness Month.

NoEscape Ransomware, AvosLocker Ransomware, Retch Ransomware, S-H-O Ransomware and More: Hacker's Playbook Threat Coverage Round-up: October 31st, 2023

In this version of the Hacker’s Playbook Threat Coverage round-up, we are highlighting newly added coverage for several recently discovered or analyzed ransomware and malware variants, including NoEscape ransomware, AvosLocker ransomware, and Retch ransomware, amongst others. SafeBreach customers can select and run these attacks and more from the SafeBreach Hacker’s Playbook™ to ensure coverage against these advanced threats.

Random but Memorable - Episode 11.7: Halloween Bug Hunting Tricks with Katie Paxton-Fear

How does it feel to find your first bug? What makes a good bug hunter? We get into all that and more with bug bounty hunter and face by the InsiderPhD YouTube channel, Katie Paxton-Fear. We also unpack the recent 23andMe data leak in Watchtower Weekly and share some fun and festive family-themed 1Password tricks in Did You Know?! 👨‍👩‍👧‍👦🎄 🏰 Watchtower Weekly 🎙 Guest Interview – Katie Paxton-Fear.

Infrastructure Auditing Made Easy

This webinar is a deep dive into Teleport’s new Audit Log capability, dashboard, and refreshed unified resource UI. Teleport 14 introduces a new audit log backend that provides unrivaled visibility into all activity on a cluster. Allow teams to translate infrastructure audits into faster insights and actions, thus helping them make informed access decisions, support downstream SIEMs, and log consolidation tools.

Compromised Online Account: What It Is and How To Prevent It

A compromised account is an account that has been accessed without the owner’s permission. Compromised accounts can happen for a variety of reasons including public data breaches, using weak passwords, failure to enable Multi-Factor Authentication (MFA) on online accounts, falling for phishing scams or having malware unknowingly installed on your device. Continue reading to learn more about compromised accounts and tips to prevent your accounts from being compromised.

Decoding Synthetic Identity Fraud in the Evolving AI Landscape

In the rapidly evolving digital landscape, artificial intelligence is a two-sided coin. Fraud protection software, like INETCO BullzAI, harnesses artificial intelligence (AI) technologies to offer fraud protection against financial criminals and cyber attackers. Conversely, fraudsters can weaponize the same technology to steal funds. A prominent example of this connection is synthetic identity fraud. This payment fraud vector often employs AI and deepfakes.