Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Bitsight - Cyber Risk Management as Visionary as You Are

Bitsight is a cyber risk management leader transforming how companies manage exposure, performance, and risk for themselves and their third parties. Companies rely on Bitsight to prioritize their cybersecurity investments, build greater trust within their ecosystem, and reduce their chances of financial loss. Built on over a decade of technological innovation, its integrated solutions deliver value across enterprise security performance, digital supply chains, cyber insurance, and data analysis.

Through the keyhole: A look at our refreshed brand

You may have noticed that some things have started to look a little different at 1Password. Over the next few weeks, we’ll continue to roll out new elements of our brand across our website, advertising, social channels, and more. And yes, while we’ve made some visual changes to the way we express our brand, we’re still the same 1Password. The values, goals, and ethos of 1Password are the same today as they were years ago.

TFiR: Let's Talk! Recovery of Velero Backups to AKS & EKS

Sebastian Glab, Cloud Architect at CloudCasa, shows you how Cloud Casa for Velero allows Velero users to manage their cluster using our software as a service platform. By plugging directly into Velero, CloudCasa provides user friendly, intuitive UI for Kubernetes cluster management utilizing Velero as the backup tool. Users can centrally manage their current backups and configuration across multiple clusters and cloud providers (AKS, EKS and GKE) in one place. They don't have to jump across different environments, access different clusters to see what's going on, they can simply go to Cloud Casa, and manage everything from there. The best part is that Velero users can get all these benefits without worrying about infrastructure management, without causing any disruptions or without having to undergo any migration process.

Closing the Cybersecurity Front Door: Addressing the Federal Government's Security Gaps

The Office of Inspector General (OIG) recently evaluated the Department of Commerce’s (DOC) cybersecurity program, uncovering critical failures that exposed the DOC to potential risks. Specific issues included the use of default passwords for administrative accounts, compromising over 100,000 pieces of personal identifiable information (PII).

US charges three men with six million dollar business email compromise plot

Three Nigerian nationals face charges in a US federal court related to a business email compromise (BEC) scam that is said to have stolen more than US $6 million from victims. 29-year-old Kosi Goodness Simon-Ebo was extradited from Canada to the United States earlier this month, according to a Department of Justice press release, and will appear before a federal court on Friday. Two of Simon-Ebo's alleged conspirators, James Junior Aliyu, 28, and 31-year-old Henry Onyedikachi Echefu.

FTC accuses payments firm of knowingly assisting tech support scammers

Multinational payment processing firm Nexway has been rapped across the knuckles by the US authorities, who claim that the firm knowingly processed fraudulent credit card payments on behalf of tech support scammers. A Federal Trade Commission (FTC) complaint argues that Nexway and its subsidiaries broke the law by helping scammers cheat money from unsuspecting consumers.

Uplevel your supply chain risk management

We’ve entered Week #3 of National Supply Chain Integrity Month, an initiative that CISA and other government agencies started to highlight the importance of securing our nation’s most critical systems and ensuring they stay resilient. For Weeks #1 and #2, I wrote about maturing your third-party risk management program and securing the small business supply chain.