Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

A day in the life of an ethical hacker

Ethical hacking refers to the practice of using hacking techniques to identify and expose vulnerabilities in computer systems, networks, and applications. Unlike malicious hackers, ethical hackers use their skills and knowledge to help organizations and businesses identify security weaknesses before they can be exploited by malicious actors. Ethical hacking can include a range of activities, from scanning and penetration testing to social engineering and physical security testing.

Dental Insurance Service Provider Hacked, Exposing Nearly 9 Million Patients

MCNA, a health insurance program service that works with children and Medicaid recipients, was recently the target of a ransomware gang. The company works with millions of patients, dental clinics, dental and orthodontic practices, and more. A huge number of patients entrust their data to this massive organization, and they are now at risk from serious cyber-attacks because of this significant data breach.

5 Best Practices for Implementing Secure and Effective SD-WAN

Corporate networks are rapidly becoming more complex and distributed. With the growth of cloud computing, remote work, mobile and Internet of Things (IoT), companies have users and IT assets everywhere, requiring connectivity. Software-defined WAN (SD-WAN) provides the ability to implement a secure, high-performance corporate WAN on top of existing networks. However, SD-WAN infrastructures must be carefully designed and implemented to provide full value to the organization.

5 Tips for Crafting a Cybersecurity Risk Remediation Plan

With the new year upon us, now is the ideal time to re-evaluate your cybersecurity controls and your cybersecurity risk remediation strategy. Do you have a plan for cybersecurity risk remediation? Has this plan outlined who needs to be involved? How are you being notified of risks? Is there a process in place to identify and prioritize the riskiest threats for rapid remediation? This year, plan ahead for evolving cybersecurity threats and follow these five tips for crafting a risk remediation plan.

Enterprise End User SSO Login

Your Keeper vault is easy to create, simple to use, and you’ll be up and running in just minutes. You can create and access your Keeper vault by either logging in directly from Keeper via an email invitation from your Keeper Administrator or from your SSO provider dashboard. You may have received an email from your organization's Keeper Administrator inviting you to create a Keeper account with a subject line that reads: "Action Required - Instructions for Your Keeper Security Account".

[FBI ALERT] Skin Deep: The Scary Reality of New Deepfake-Enabled Sextortion

Today, the FBI alerted warned against a new even more disgusting type of sextortion. Previously, these schemes involved coerced or stolen digital material, but now some criminals are using technology to create explicit content from innocent images or videos found online. This information comes from today's alert by the FBI's Internet Crime Complaint Center (IC3).

Redefining Personal Data: Understanding the EU General Court's Ruling on Pseudonymized Data

In a ruling made on April 26, 2023, the General Court of the European Union (EU) made a groundbreaking decision changing the definition of personal data that has been in place since the adoption of the General Data Protection Regulation (GDPR). This ruling has significant data-sharing implications for organizations within the EU and enables them to share data with third parties more easily, as long as it’s appropriately de-identified.