Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Elizabeth Harz RSAC 2023 Interview

Elizabeth Harz, CEO of Veriato, gave an interview to ISMG at this year’s RSA Conference in San Francisco. In it, Elizabeth covers the challenges of maintaining data security in the remote or hybrid workforce environment and the rising cost of data breaches. She also discusses some of the tools and solutions and can help businesses better manage their cybersecurity challenges.

Three New BGP Message Parsing Vulnerabilities Disclosed in FRRouting Software

In our new vulnerability research report, Forescout Vedere Labs discusses an often-overlooked aspect of Border Gateway Protocol (BGP) security: vulnerabilities in its software implementations. More specifically, vulnerabilities in BGP message parsing found in the popular FRRouting implementation that could be exploited by attackers to achieve a denial of service (DoS) condition on vulnerable BGP peers.

Pixels/Trackers transfer data to foreign locations around the globe - including nation states of concern

By analyzing over 3,000 websites and over 100,000 associated webpages (using the client-side security scanning feature of Feroot Inspector) across 6 sectors, it was determined that pixels/Trackers transfer data to almost 100 countries around the globe. Table 1 shows the top 40 destinations of data being transferred by pixels/trackers collecting data from the analyzed websites – all of which were US-based.

Tines browser extension configuration guide

Professionals working in Cyber Threat Intelligence (CTI) enjoy playing detective, researcher, analyzer, and communicator. With Tines, now there’s a better way to quickly get answers for some of the most common questions that can tip off more strategic (read: exciting, fulfilling, meaningful) threat intelligence research.

Fireblocks launches support for Avalanche Spruce Subnet

Fireblocks has launched support for Avalanche’s subnet, Spruce, an EVM-based testnet built for institutional blockchain deployments. Spruce is intended to be used by buy and sell-side institutions looking to experiment with blockchain infrastructure in a low-risk environment. Institutional participants have already begun onboarding onto the testnet, and will be using it to evaluate the advantages of executing and settling trades on-chain for different assets and applications.

National Cybersecurity Deep Dive: Invest in a Resilient Future and Forge International Partnerships

The first three pillars of the National Cyber Security Strategy focused on activities that could be accomplished in the near term–perhaps within a few years. The last two pillars start looking at some challenges that we need to address now.

ThreatQ v5: An Even Smarter Single Source of Truth

We’ve come a long way since ThreatQ v4 and our own Jay Allmond, UK Threat Intelligence Engineer at ThreatQuotient, recently shared the details during a hands-on webinar that’s now available on-demand. In this 30-minute session that as Jay says, “is light on PowerPoint and heavy on nerdy stuff”, we review the basics of the ThreatQ Platform and dive deep into some of the newest capabilities.

How Do You Perform a Supplier Risk Assessment?

When choosing a supplier to partner with, organizations need to perform their due diligence and assess the cyber risks associated with each particular supplier using risk assessment evaluations. Part of the supplier lifecycle management process includes ensuring that these third parties are meeting minimum security requirements, maintaining strong cybersecurity programs, and adhering to all relevant compliance regulations.

Quality of Experience vs Quality of Service: Which are You Getting?

Quality of Service (QoS) is a standard metric for any infrastructure, networking, or operations team contracting with a tech vendor The average network SLA, for example, is crawling with QoS metrics covering a range of things, including packet loss, jitter, latency, bandwidth allocation, response time, and uptime.