Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Enhance network security: 6 key steps for an effective firewall rule audit

A firewall rule audit is an essential process for ensuring that your firewall rules are effective and aligned with your security policies. As network environments grow more complex, managing and optimizing firewall rule bases becomes increasingly challenging. Over time, firewall rules can accumulate, leading to bloated, inefficient rule sets that hamper performance, increase security risks, and complicate compliance efforts.

More than a security alert: A guide to nudges

As American poet Nikki Giovanni wisely observed, "Mistakes are a fact of life. It is the response to error that counts." This rings particularly true in the world of cyber security. Even the most vigilant individuals can make mistakes—after all, we’re only human. What truly matters is how we respond. Imagine a platform that automatically detects risky security behaviours, alerting employees and nudging them to fix their mistakes before they escalate?

5 Ways a Network Digital Twin Can Revolutionize CVE Compliance

In the rapidly evolving cybersecurity landscape, the sheer volume of Common Vulnerability and Exposure (CVE) notices has become a daunting challenge for SecOps teams. In 2023 alone, the National Institute of Standards and Technology (NIST) issued 28,901 CVE notices, reflecting the growing complexity and intensity of potential threats.

Phishing and Ransomware: How Threat Actors Attack the Financial Services Sector

Trustwave SpiderLabs is prepped to launch its newest threat intelligence research, the 2024 Trustwave Risk Radar Report: Financial Services Sector. The upcoming report, which is set to be released on September 10, promises to be an indispensable resource for cybersecurity professionals. This comprehensive report not only sheds light on the modus operandi of a dominant ransomware gang but also delves into the persistent use of phishing and brute-force attacks to compromise credentials.

Understanding Adjust Memory Quotas for a Process

The windows security setting adjust memory quotas for a process, specifies who has the permission to change the maximum amount of random access memory (RAM) that a program or application can access at any specific time. Doing so controls and manages system resources, ensuring the system runs smoothly. The adjust memory quotas for a process setting decides who can change a program or process' memory quota.

Threat Actors Increasingly Exploit Deepfakes for Social Engineering

The availability of deepfake technology has given threat actors a valuable tool for social engineering attacks, according to researchers at BlackBerry. “Typically, online scams prey on the presumed weaknesses and susceptibility of the targeted individual,” the researchers write.

Keeper Named Value Leader by EMA for Privileged Access Management

Keeper is cost-effective and easy to deploy – and the industry is taking notice. Keeper Security’s zero-trust Privileged Access Management (PAM) solution, KeeperPAM, has again been recognized as a Value Leader by the IT and data management analyst research and consulting firm Enterprise Management Associates (EMA) in its 2024 PAM Radar Report: Read the Full Report.

How To Spot a Credit Card Skimmer

According to the FBI, credit card skimming costs individuals and banks approximately $1 billion annually. You can spot a credit card skimmer by searching for a tampered security seal, checking for misalignments, wiggling the card reader or looking inside the card reader. Continue reading to learn more about credit card skimmers, how to spot them and what you can do if your card gets skimmed.

Prompt Sanitization: 5 Steps for Protecting Data Privacy in AI Apps

As Generative AI (GenAI) and Large Language Models (LLMs) become integral to modern apps, we face a critical challenge of protecting sensitive user data from inadvertent exposure. In this article, we’ll explore the importance of content filtering in LLM-powered apps, and provide strategies for its implementation. Looking for step-by-step tutorials on prompt sanitization for OpenAI, Langchain, Anthropic, and more? Skip down to the “Tutorials & further learning” section below.