Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Number of Data Compromises Affecting U.S. Organizations Rises To 77%

New data summarizing the compromises of data in 2023 provides key details on who’s being targeted, what types of data is being compromised, and what attack vectors are being used. I’ve covered reports from the Identity Theft Resource Center (ITRC) – their coverage of attacks over the years has grown to include much more than identity theft.

Phishing Campaign Exploits Remote Desktop Software

A phishing campaign is attempting to trick users into downloading remote monitoring and management (RMM) software like AnyDesk, Atera, and Splashtop, according to researchers at Malwarebytes. While these tools are legitimate, they can be exploited by threat actors to carry out many of the same functions as malware. These tools may also be less likely to be flagged as malicious by antivirus software.

Transforming Cybersecurity Risk Assessments Into Actionable Plans With CRQ

‍Market success has often demanded that business leaders take risks. Some of the most profitable executives are those who have pursued bold initiatives, recognizing, despite the dangers, the potential rewards. However, as organizations grow and become more complex, the costs of these risks rise, demanding a more data-driven approach to its management.

Rubrik Recognized as a 2024 Gartner Peer Insights Customers' Choice

Rubrik is on a mission to secure the world’s data. And our customers are at the very heart of that mission. Everything we do is with you, our customer, in mind, ensuring continual value in every step of our journey. We are dedicated to constant innovation in data security and know that simplification and automation of cyber detection and recovery is top of mind for organizations as cyber incidents are increasingly frequent and attacks are quickly evolving.

What is the DevSecOps Maturity Model (DSOMM)?

High-velocity software development today is close to impossible (and most certainly not sustainable) without DevOps. The migration to the public cloud, along with increasing regulatory demands, and other factors made application and code security as vital as DevOps. Thus were born the practices and frameworks of DevSecOps. The value of DevSecOps is evident and clearly understood by technologists.

The Big Payback: How to Scam a Scammer

When encountering a scammer online, the best method is to block, report, and move on. Let the law take charge of handing out consequences to scammers, and you can focus on stopping scammers in their tracks. Sometimes, this can be more challenging as online scammers become more adept at tricking people into believing their lies, using technology, social engineering, and emotional manipulation to achieve their aims.

Snyk & ServiceNow

Did you know that up to 90 percent of modern software uses open source software? Often SecOps, AppSec and IT teams don’t have a complete view of their application security risk across the organization. The Snyk and ServiceNow integration efficiently finds, prioritizes, and tracks vulnerabilities in open source dependencies to get a complete view of your application security posture and drive smarter, faster fixes in ServiceNow workflows.

2024: Practical cyber action plan- Survive and thrive

'Cyber insecurity' is among the most pressing issues facing organizations globally in 2024, according to new research from the World Economic Forum (WEF). In its Global Cybersecurity Outlook 2024 report, the WEF found that more than eight in ten organizations surveyed feel more or as exposed to cyber crime than last year.