Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Dynamic Data Masking | (Sanjay - Executive Director, MSCI)

Here are some highlights of the conversation between Sanjay (Executive Director, MSCI) and Venky (Founder, Indusface). Sanjay has worked in Microsoft for over 14+ years and shares his experience on secure coding best practices & methods to handle customer-sensitive data. Key highlights from the discussion.

Budget Shifting and Changing Market Dynamics: Impact on Cybersecurity

In this video, we discuss the shifting of budgets and the efforts of individuals to maximize their budgets in light of incomplete payments. These changes in buying behavior are expected to create different market dynamics. From a cybersecurity perspective, the impact can be detrimental for certain companies as aggressive budget cuts may occur. We are already witnessing a trend where some believe automation, like chat GPT, can solve their security challenges. However, it is important to note that expertise is crucial in utilizing such tools effectively. While they can enhance efficiency and address skill shortages, they cannot substitute for a comprehensive security budget.

The 443 Podcast - Episode 247 - A New Russian APT

On this week's episode we discuss the newly named threat actor Cadet Blizzard, including their typical tools, tactics and procedures. We also cover CISA's newest binding directive to federal agencies. Before that, we give an update on exploited MOVEit Transfer servers and the latest Bitcoin laundering technique.

Overview of AWS IAM Best Practices

In the ever-evolving landscape of cloud security, AWS Identity and Access Management (IAM) plays a critical role in safeguarding your AWS resources. By following IAM best practices, you can fortify your cloud environment, mitigate risks, and maintain granular control over access permissions. In this quick guide, we will review essential IAM best practices, from implementing least privilege to leveraging advanced features.

5 Tips for Successful Penetration Testing: Unleashing the Art of Hacking for a Safer Tomorrow

Ah, the exhilarating world of penetration testing! It's like being a burglar, but with a legal and moral compass guiding your actions. In this article, we'll delve into the realm of successful penetration testing and equip you with five practical tips to make your hacking endeavors truly impactful. So, grab your virtual lockpicks and let's get started!

MOVEit Supply Chain Attack Campaign Update

In the past two weeks, three new vulnerabilities in the the MOVEit file transfer software have been discovered, including one over the weekend. The MOVEit file transfer software is used by around 1700 organizations worldwide. As in most cases when supply chain modules are being compromised, the impact is lethal as big companies such as the BBC and Zellis have been targeted.

AI vs. Hackers: How Artificial Intelligence is Changing the Game in Cybersecurity

Artificial Intelligence (AI) has been used in every field today and become more and more prevalent. AI analyzes and trains large amounts of data. Furthermore, AI creates data patterns and makes correlations between them. The important thing about creating data patterns is that AI can use these data patterns and correlations for future cases.