Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Lookout

Understanding Monetary Authority of Singapore's (MAS) Guidance: Safeguarding Your Financial Institution's Cloud Environment

As a major financial hub in Asia and globally, Singapore is very aware of the challenges facing the financial industry, especially the accelerated digital transformation that stemmed from the COVID-19 pandemic. In response to the sector’s increased exposure to cloud technology, the Monetary Authority of Singapore (MAS) has released a guideline to address cybersecurity risks associated with the adoption of public clouds.

Behind the Buzzword: Four Ways to Assess Your Zero Trust Security Posture

With just about everything delivered from the cloud these days, employees can now collaborate and access what they need from anywhere and on any device. While this newfound flexibility has changed the way we think about productivity, it has also created new cybersecurity challenges for organizations. Historically, enterprise data was stored inside data centers and guarded by perimeter-based security tools.

What to consider when assessing a CASB with Aaron Cockerill

All roads lead to Cloud Access Security Broker (CASB). Gartner found CASB to be the fastest-growing cyber security segment, with investment increasing by 41.2% (2021 CIO Agenda Survey). It's no surprise, as security teams turn to CASB to solve new cloud service-related challenges that legacy security solutions cannot address.

Pfizer IP Leak Isn't Unique. Protect Your Cloud Data With Proactive Encryption.

The pharmaceutical company Pfizer recently acknowledged that thousands of internal documents were leaked, including trade secrets related to its COVID-19 vaccine. In a California lawsuit, Pfizer stated that a former employee had exfiltrated sensitive data to their personal cloud accounts and devices while they were still working there.

How to Keep Your Data Secure in Light of Apache Log4j Vulnerabilities

In quick succession in December, The Apache Software Foundation released information on two critical vulnerabilities in its Log4j Java-based library. The first vulnerability CVE-2021-44228, also known as Log4Shell or LogJam, was reported as an unauthenticated remote code execution (RCE) vulnerability. By exploiting how the library logs error messages, it could lead to a complete system takeover.

Start Your Zero Trust Journey With the Gartner SASE Roadmap

Here’s the reality: hybrid and remote work are here to stay. This means access to your corporate data can now come from anywhere, on any device and any network. In order to tackle this new norm, Gartner has defined a new cybersecurity framework called Secure Access Service Edge (SASE).

Ain't No Mountain High Enough: Achieving Zero Trust For A Mobile Workforce With Art Ashmann (VMware)

Widespread remote work has called for a paradigm shift in how we conduct enterprise cybersecurity. On this week’s Endpoint Enigma, VMware Staff EUC Solutions Engineer, Art Ashmann joins Hank Schless to discuss how mobile and cloud technology have enabled us to manage both work and personal responsibilities from anywhere and what organizations can do to securely take advantage of it.

Predictions 2022: Five Threats That Will Impact Your Personal Data and Privacy

In Q1 of 2021, 4 in 10 people encountered an unsafe link while using their mobile devices – less than a year later, 5 in 10 people encountered threats in Q3 2021. This trend will only continue as text message, email and social media phishing scams surge.

Half a bitcoin to get your data back? How to defeat ransomware attacks.

Ransomware attacks aren’t going anywhere. If anything these threat actors have made their operations an enterprise, creating scalable, repeatable, and profitable campaigns. While there is no silver bullet to ransomware-proof your organization, there are a number of Zero Trust approaches that can mitigate the risk.

Predictions 2022: Work-from-anywhere Marks the Beginning of the End of On-premises Security

A decade ago, many were reluctant to move to the cloud. Many felt like they would have to relinquish controls they had within their perimeters. That sentiment has since reversed, where organizations have become more comfortable with cloud technology. The newest concern is about corporate data leaving the cloud, especially as employees expect to work from anywhere. Software-as-a-service (SaaS) applications have enabled people to stay productive from anywhere, but have also amplified security gaps.