Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

12 Common Tools for Your DevOps Team

DevOps is revolutionizing the way enterprises deliver apps to the market by blending software development and information technology operations. This convergence creates an assembly line for the cloud, as Tim Erlin wrote for The State of Security, by increasing the rate at which companies can develop apps and deliver them to users.

How hospitals can secure patient data by equipping clinicians

Healthcare breaches continue to be featured in the news. Hospitals continue to be ideal targets for hacking and other cybersecurity threats. This is evidenced by the increasing number of cyber attacks, including sophisticated ransomware attacks on hospitals. Many hospitals are beefing up their technologies and infrastructure to address the threat of cyber attacks. But they are neglecting a major weak link in data security: the clinicians.

Secure deployments using Kubernetes admission controllers

Kubernetes admission controllers are a powerful Kubernetes-native feature that helps you define and customize what is allowed to run on your cluster. An admission controller intercepts and processes requests to the Kubernetes API prior to persistence of the object, but after the request is authenticated and authorized.

Office 365 Phishing Attacks: Educating Our Attackers...

Why are hackers increasing levels of Office 365 phishing attacks? This article will explain some key processes how and why Office 365 phishing attacks are a persistent and ever evolving threat. Additionally, why we may be arming our attackers with the exact same education as we provide our own users…

How to set up two-factor authentication (2FA) on Linux or Windows Server with Ekran System

In this video, you’ll learn how to set up two-factor authentication on your servers using Ekran System’s two-factor authentication tool. This tool uses an industry-recognized format that combines two authentication factors: knowledge of user credentials and possession of a verified mobile device.

Privileged Access Management Issues? Enter Tripwire Password Manager

So, you have 2000 network devices in your environment and everyone is telling you that you have to rotate all 2000 device passwords every 30, 60 or 90 days (at a minimum) — who has time for that?! How are you going to manage this? The task seems monumental and time-consuming! If nothing is done, then your security/compliance posture will worsen due to reusing passwords that are easy to remember across assets. In addition, passwords could become stale and give adversaries more time to crack them.

Cloud Services: Your Rocket Ship Control Board

The move to the cloud — in many ways — is a return to the early days of computing. When I took my first computer class in 1978, we used an IBM 360 system time share. We rented out time on a remote system — sent our jobs over a modem to a computer at a university — and got back the results of the program run. Today, we’re using the cloud, which is just a fancy version of the old time-share systems.

Unpatched Vulnerabilities Caused Breaches in 27% of Orgs, Finds Study

In May 2019, Verizon Enterprise released the 12th edition of its Data Breach Investigations Report (DBIR). Researchers analyzed a total of 41,686 security incidents, of which there were 2,013 data breaches, for the publication. More than half (52 percent) of those reported breaches involved some form of hacking. The report listed the most prominent hacking variety and vector combinations, with “vulnerability exploitation” making the top three.

Cyber Security Trends in the Financial Sector

Financial gain is one of the most common motivations behind cyber-attacks, making the financial sector an attractive target for cyber criminals. Recently, it was reported that companies in finance lost nearly $20 billion due to cyber-attacks and breaches. Furthermore, it was reported that financial companies get attacked 2500x more than a typical business for a total of over one billion attack attempts in a single year. These attacks don’t just target financial institutions.