Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to use Jit Security as a developer

Welcome to Jit! In this video, we'll explore the developer experience of Jit. Once Jit is installed in your GitHub environment, it scans the changes for each new pull request introduced to the monitored repo or organization based on your company’s security plan. For many findings, Jit will propose an auto-remediation. Click ‘Commit Suggestion’, and the finding will be resolved.

User identity mapping for improved anomaly detection

In any organization, a user may access numerous devices and applications, but not always with the same username or credentials. Devices and applications use platform-specific user registries that are distinct from each other. As a result, organizations may end up monitoring five user identities from five devices separately, while they actually belong to a single user. The table below shows one user, Michael Bay, using different user identities to log on and access various devices and applications.

Mobile App Threat Modeling and Security Testing

As technology progresses and mobile devices become ubiquitous, a remarkably large number of people worldwide are now using smartphones. In fact, current estimates show that 6.8 billion users rely on their phones for an array of activities; but most significantly – 88% is dedicated to app usage! While the above stats show that the mobile app industry is thriving, it's also a matter of concern. Why?

PAM Masterclass - Episode 4: Simplifying privileged session management

In this episode of PAM masterclass, you will learn how to launch privileged sessions by configuring remote access pathways. You will also gain insights into how admins can monitor and record live sessions and suspend malicious user activities using ManageEngine's flagship PAM suite, PAM360.

Cyber Insurance: Is Paying a Ransom Counter-Productive?

Food for thought as discussed on May 18, 2023, an article posted in The Australian Insurance Council: Banning paying a ransom to cyber hackers is counter-productive where Andrew Hall, the Chief Executive of the Insurance Council of Australia (ICA), stated that “attempts to ban businesses from paying ransoms for cyber attacks risks eroding trust and relationships with government.”

New Top-Level Domains as Potential Phishing Risk

Google has recently introduced a set of new top-level domains: .dad, .esq, .prof, .phd, .nexus, .foo, .zip and.mov. They’re now available for purchase, and it’s the last two that are attracting attention due to the risk of abuse in phishing attacks. WIRED describes why.zip and.mov have raised concerns. “The two stand out because they are also common file extension names. The former, .zip, is ubiquitous for data compression, while.mov is a video format developed by Apple.

[New & Improved] QR Code Phishing with Snail Mail Postcards

One of KnowBe4's long-term employees just send me a picture this morning of a postcard that sure looks like it's phishing, the good old-fashioned way: snail mail! Here is the picture and you tell me what all the red flags are! The domain does not work of course. The email seems to have disappeared into the bitbucket. For many obvious reasons i have not tried the QR code since I do not have a bulletproof sandbox installed on my smartphone where I can detonate malware. :-D.

Red Hat and CyberArk Develop an Approach To Centralize and Automate Secrets Management

Discover the power of Red Hat and CyberArk as they join forces to revolutionize your security practices. Say goodbye to being controlled by secrets and embrace a centralized, automated approach that guarantees a secure environment without compromising your freedom. Explore the ultimate solution to keep your systems protected while enjoying enhanced flexibility. Watch now and unlock a new era of cybersecurity!

The Cyber Essentials 2023 update - what's involved?

The National Cyber Security Centre (NCSC) describes this update, version 3.1, as a ‘lighter touch’ update than the previous iteration in 2022, but it still contains some important updates and clarifications. In this blog post, we provide a brief overview of some of the changes. Cyber Essentials is an initiative created with the aim of increasing awareness of cyber security issues and enabling companies to address common types of cyber threats.