Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why The Four Eyes principle is critical for access

The four-eyes principle means an activity must be approved by two people, or from Argus Panoptes if the ancient Greeks needed access controls. This principle is commonly used in both routine and non-routine scenarios. On the routine side are “Business Execution” processes. Here the Four Eyes principle is used to stop negative outcomes as the result of poor execution of a regular business task.

The U.S. Department of Justice Announces Takedown of the Cyclops Blink Botnet

Today, the U.S. Department of Justice (DOJ) announced further actions to disrupt Cyclops Blink, a sophisticated state-sponsored botnet that affected network devices from multiple vendors, including a limited number (less than 1%) of WatchGuard firewall appliances.

Hop-by-Hop Visibility

Time is money, especially when it comes to the cloud. Fast resolution of performance issues is a must to ensure business continuity and positive customer experiences. But your network and security teams can’t start working with cloud providers to resolve issues if they’re stymied by blind spots in their efforts to prove network innocence. Every company with a hybrid multi-cloud environment has struggled with visibility in the cloud.

Lookout Helps a Large Construction Firm Protect Intellectual Property Shared Between Employees, Partners and Contractors

Large construction firms rely on a vast network of architects, engineers, project managers, contractors, and suppliers to collaborate on projects of all sizes and complexities. While the digitization of the construction industry has made it easier for these project teams to share information, it also expands the cyber-attack surface.

Casino Cybersecurity: A Winning Bet

According to the American Gaming Association, there are 981 casinos in the United States, raking in more than $57 billion annually in gross gaming revenue. With that much money at play, it’s no wonder hackers view casinos as potential jackpots. And while the public tends to consider casinos as exceptionally secure, the reality is this: When it comes to cybersecurity, the house doesn’t always win.

Testing OWASP's Top 10 API Security Vulnerabilities (Part 1)

Application Programming Interface (API) attacks are set to become one of the most prevalent cyberattacks with a broad target range. By nature, APIs expose application logic and sensitive data such as personally identifiable information (PII), causing APIs to become a target for attackers. In 2019, Gartner predicted that API hacks would become the most common form of cyberattacks in 2022. So how can teams stay ahead of API attacks?

Spotlight on Technology - Secure Content Collaboration

Razorthorn MD James Rees is joined by Andy Johnson from HighSide - experts in controlled file sharing and secure collaboration - for a discussion on what can be done to improve data security for businesses operating in security-conscious and regulated industries. Working remotely requires online collaboration with colleagues and external organisations, but when you send a file or speak via an online chat platform, you're opening up safety risks due to a lack of adequate security and encryption.

Why MDR is Your Most Important Security Investment

The cybersecurity threat landscape is continuously evolving, with the frequency and impacts of threats like malware and ransomware increasing every year. Today, organizations of all sizes and in every industry sector must be proactively searching for emerging threats and actively monitoring risk to protect themselves – and respond quickly in the event that a threat is identified.

The No-Cost Way to Level Up Your Cybersecurity Posture

In recent weeks President Biden issued a statement encouraging organizations to level up their cyber defenses in what he called “a critical moment to improve domestic cybersecurity and bolster national resilience.” The following week, the federal budget proposal for FY2023 was released with a nearly $11 billion line item for cybersecurity measures.

5 Ways to Illuminate Your Attack Surface Blind Spots

How well do you know your organization’s attack surface? Chances are, you don’t know it as well as you think you do. According to a recent report, 2 out of 3 organizations say their external attack surface has expanded in the past 12 months, but that does not mean they’ve been keeping track of it.