Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What is a cybersecurity report? Why are they necessary?

Waves of change are constantly disrupting companies of all sizes around the world, particularly when it comes to cybersecurity. Digital infrastructure keeps expanding, work models constantly change, and the web between businesses gets more and more intertwined. It’s no surprise that CISOs and risk leaders are evolving. A majority of boards now see cyber risk as business risk, so they’re asking hard questions around risk and exposure.

RSAC 2023: A Summary

With the dust now settled and life returning to some semblance of normalcy, we’ve still been ruminating on our week in San Francisco. It was an incredible and busy week, with a lot of top notch sessions, discussions, and of course the bustling expo. We compiled some of our daily thoughts after each full-day at the show, which you can read here, but now with some perspective, we wanted to share our four most memorable takeaways from RSA Conference 2023.

Privacy is Power: The Value of Training for Modern Data Protection

We’ve all seen it in the movies: The chief of security declares that no one could ever steal the “Famous Jewel” because it’s protected by thick glass, an impenetrable system of motion-detecting lasers, and, finally, a weight-sensitive sensor. Cut to the next scene, where a thief, dressed in sleek black, zip-lines from an open skylight, shorts the lasers, scores the glass, and with split-second timing, swaps the jewel for a replica of equal weight.

Relentless Threat Activity Puts Identities in the Crosshairs

One set of valid employee credentials can provide an adversary with all they need to log into a business, move laterally, escalate privileges and achieve their goals — whether that’s removing access to accounts, terminating services, destroying data or deleting resources. Identity-based attacks are subtle, but destructive, and organizations must be on high alert for them. CrowdStrike reported 80% of cyberattacks now leverage stolen or compromised credentials.

Developing a Culture of Cybersecurity Within Your Organization

Building a cyber-resilient organization requires more than implementing the best cybersecurity practices. Cybersecurity must be woven into the culture of the organization from the top down. Because 95% of data breaches result from human error, creating a cybersecurity culture can significantly cut down on security breaches by emphasizing the importance of cybersecurity. Cybersecurity is only as strong as its weakest link.

Albertsons Grocery Chain Gets Hacked: Customer and Employee Data Exposed

Albertsons is a major grocery chain in the United States. The company is based in Boise, Idaho, and oversees a huge range of different grocery stores throughout the country. Stores like Star Market, Tom Thumb, Acme, Safeway, Vons, Balduccis, Food Lover's Market, Shaw's, Albertsons, and more.