Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Prevent SVB-Related Social Engineering Attacks

Silicon Valley Bank (SVB) experienced a rapid implosion last week after a historic bank run. While many are discussing the immediate financial impacts to the bank accounts — which were largely held by venture capitalists, investors, and technology business owners — and the larger impact on banking in general, it’s important to note that there will be a secondary impact. Hackers and scammers are going to take advantage of the confusion to launch a barrage of social engineering attacks.

Binge in Private: What Are the Most Secure Streaming Services?

Streaming platforms have become the go-to option for entertainment, especially in the wake of the pandemic. However, with an increase in the number of streaming services, the security concerns surrounding them have also escalated. While you may be enjoying your favorite TV shows or movies, have you ever wondered whether your private data is safe from prying eyes? We'll take a closer look at the most secure streaming services that provide peace of mind while you stream.

4 Steps to Safeguarding SD-WAN in Response to Rise of Remote Work

Ensuring employees operate securely regardless of location has grown in importance over the last several years as the number of people working remotely has exploded. These workers are most likely operating within a software-defined wide area network (SD-WAN). They use SD-WAN to work with data that is now processed more and more in many different cloud services.

How Retiring Gas and Coal Plants Affects Grid Stability

Legacy gas and coal plants are being aged out – and no one wants to pay enough to keep them going. With increased pressure from green energy laws and added competition from renewable sources, these monsters of Old Power are being shown the door. Considering they've predated and precipitated all Industrial Revolutions (except for this last one – that was digital), it's safe to say they've had a good long run. So, what's the fuss?

API4:2019 - Lack of Resources & Rate Limiting: The What, Sample Exploit, and Prevention Methods

Lack of resources & rate limiting is #4 on the OWASP Top 10 API Security Risks 2019. It is a prevalent API security risk. As per OWASP, rate limiting and resource-related flaws in APIs are quite easy to exploit, especially with automated toolkits and for-hire services. But the exploitation of the lack of resources & rate limiting flaws has severe consequences for the organization. So, what exactly is this security risk, and how do you prevent it?

Key Considerations for Building a Successful Cloud Security Program

I recently had the pleasure of participating in a great panel discussion at the San Diego Cyber Security Summit, entitled “Cloud Security — Leveraging Its Strengths and Overcoming Its Vulnerabilities,” alongside representatives from Palo Alto Networks, Gigamon, Sysdig, Lacework, Imperva, and Tufin.

Minneapolis Schools are Facing a Cyber Ransom of $1 Million

The Minneapolis public school district includes approximately 100 primary and secondary public schools. Between the many different schools, approximately 36,000 students are served by about 1,500 teachers. The district is currently suffering from a ransomware attack supposedly and is being extorted for a $1 Million payment by a ransomware gang.

More than 1 Million Patients with Zoll Medical Were Exposed by Data Leak

Zoll is a medical device and technologies company that offers its services to EMS, fire professionals, and rescuers. Even the U.S. Military relies on technologies from the company in order to save lives. Zoll recently suffered from a cyber attack that may have exposed over 1 million individuals. The attack happened fast and was coordinated by an unknown group, and we still don't have all the specific details yet.