Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Quantify the ROI of Your GRC & Security Programs: 3 Lessons Learned from Successful GRC Teams

GRC programs are often viewed as cost centers. But, they can in fact be profit drivers by contributing to sales acceleration, cost and time savings, and risk reduction. In this session, we shared insights on calculating the ROI of GRC, by connecting to key metrics like contractual liability, resource costs, and operational efficiency. We also provided practical examples of how to gauge program success.

Mitigating the Latest Microsoft Teams Vulnerability with Netskope

Recently, a team of experts from JumpSEC Labs discovered a vulnerability in Microsoft Teams that allows malicious actors to bypass policy controls and introduce malware through external communication channels. Leaving end-users susceptible to phishing attacks. Microsoft’s advice is to educate end-users to detect phishing attempts. One workaround would be to disable Microsoft Teams collaboration with external organizations.

5 Insights to Planning for a More Cybersecure World

SecurityScorecard recently joined the World Economic Forum’s Centre for Cybersecurity and UC Berkeley’s Center for Long-Term Cybersecurity (CLTC) for a private, invite-only workshop in Washington, DC alongside global leaders, CEOs, and CISOs to identify trends and insights that will most likely impact cybersecurity in the next decade of 2030 via future-focused scenarios with emerging cybersecurity challenges.

CodeSecDays brings security leaders together to build a world without software security issues

In GitGuardian's first digital conference, CodeSecDays, security leaders from multiple leading companies like Snyk, Chainguard, Doppler, RedMonk, and more came together to share the latest in code and application security.

The 443 Podcast - Episode 251 - Red Teaming AI Systems

This week on the podcast, we give an update on last week's discussion around a China-based APT targeting government organizations. After that, we cover the latest uses of generative AI like ChatGPT by malicious hackers. Finally, we end with a report from Google on their efforts around Red Teaming Artificial Intelligence systems.

Webinar: Top Security Threats Worldwide Q1 2023

Join WatchGuard CSO Corey Nachreiner and Director of Security Operations Marc Laliberte as they discuss key findings from the WatchGuard Threat Lab’s Q1 2023 Internet Security Report. They’ll cover the latest malware and network attack trends targeting small and midsized enterprises and defensive tips you can take back to your organization to stay ahead of modern threat actor tactics.

AWS Identity Center (SSO) vs. AWS Identity Federation vs. AWS IAM

Selecting an identity management solution is a critically important decision for any software organization. Identity management is a foundational component of good cloud security and can either be an enabler for scalability or a huge technical debt sink. Many organizations start with AWS by quickly throwing together their IAM infrastructure: some users, a few roles, and some policies.

Immutable vs. Mutable Backups: Does it Really Matter?

As the fight against ransomware continues, the value of data cannot be understated. Considering what a breach could cost and how long it would take to rectify, it’s no wonder risk mitigation and response is at the forefront of every IT leader’s mind. When discussing data storage, data permanence is often discussed as a way to retain information indefinitely. But when it comes to the threat of ransomware, does the immutability of your backups play such an important role?

Cyber Security Behaviours: Bridging the Gap Between Awareness and Action

Awareness of potential threats is merely the first step; true change is brought about when secure practices become habitual through consistent reinforcement. The focus on cyber security behaviours is pivotal, as it converts theoretical knowledge into routine action. This ensures that employees not only understand the nuances of the threat landscape but also possess the capability to respond effectively during a genuine cyber attack.

Electrifying Exploit: A Case Study on SSRF Vulnerability in an EV Manufacturer's System

You're cruising down the highway in your sleek, state-of-the-art electric vehicle (EV). The hum of the electric motor is your soundtrack, the open road your cinema. Your dashboard, a symphony of lights and numbers, is a live feed of your vehicle's vitals – battery levels, tire pressure, energy consumption, and more. Suddenly, your phone buzzes. It's your EV's companion app, alerting you to an unexpected battery drain.