Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

6 Ways to Manage Regulatory Risk in Cybersecurity

Keeping up with ever-changing regulatory requirements for cybersecurity can prove difficult for many organizations, which may unknowingly become non-compliant if they fail to adapt to new laws and regulations. Healthcare organizations and financial services must be even more vigilant with compliance. Both sectors are subject to even stricter requirements due to the large quantities of personally identifiable information (PII) they manage.

Black Hat USA 2022: Key Highlights

Arriving at the keynote hall for Black Hat 2022, I was immediately struck by the size of the crowd – after the seemingly endless pandemic hiatus, the cyber industry had come out in force. The mood was one of enthusiasm, and the entire place reverberated with the vibrancy of reunion. It was a great event for the industry – and for HelpSystems – and a few things stuck out.

Financial Services Organizations Have Fewer Security Flaws in Applications

According to our most recent State of Software Security Report, the financial services industry has fewer security flaws in its applications than last year. Great news, right? That said, the reduction in security flaws isn’t as significant as we would hope to see. The financial services industry has traditionally been recognized for having the least amount of security flaws.

The 443 Podcast Episode 206 - 2022 Black Hat and Def Con Recap

This week on the podcast we review our time at this year's Black Hat and Def Con cybersecurity conferences in Las Vegas. We'll cover how the WatchGuard CTF contest went this year and discuss takeaways from a few of the briefings we attended. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Email and cybersecurity: Fraudsters are knocking

Can you remember your first email? Either sending one, or receiving it? I certainly remember explaining to people what email was, and I also remember someone telling me they could live without their email server for “about a month before it becomes a problem”. Can you imagine that now? A month without email?

Code repository scanning & Container image registry scanning with Kubescape

New exciting Kubescape features have recently landed - Code repository scanning & Container image registry scanning! By enhancing Kubescape's security posture capabilities, you will be able to embed security even earlier in the SDLC (Software Development Lifecycle) and in a broader range of places in your CI/CD pipeline.

Rubrik and GraphQL - Episode 2 - GraphQL Queries

At the core of GraphQL lies the query. Queries allow us to fetch exactly the data we need from the Rubrik platform. This episode will dive into how we form basic queries to retrieve Rubrik objects for usage with automation. We’ll talk about how to form a query, create fragments, and pass data into our queries using variables.

3 examples of organizations that could have benefited from a CASB

In recent times, the widespread use of cloud services has become common for most organizations. While many organizations now enjoy the savings and convenience afforded by hosting their data and services on cloud platforms, this shift towards the cloud brings with an increased vulnerability to data theft and cyberattacks.

How to Share Passwords and MFA Codes with Employees

Organizations should implement consistent cybersecurity practices to protect their businesses and employees. Password sharing is a common but risky practice in many workplaces that can leave companies vulnerable to a data breach. Sharing passwords is sometimes unavoidable in the workplace, since many businesses often need multiple employees to access a single user account.