Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

How Can You Detect an Insider Threat?

Data security is a term we’re all pretty used to hearing by now, but cybercriminals are only one part of the equation. Did you know that internal employees can also pose a threat to your business? Insider threats are caused by internal staff, employees, or partners who either wish to cause the company harm - or who simply compromise your organization’s data security through carelessness or lack of training.

Why right now is the best time to assess your cyber response to COVID-19

The initial response to the COVID-19 pandemic put cybersecurity programs to the test. While organizations quickly rolled out business continuity plans to transition workers from the office to the home and to migrate business online to keep customers and supply chains moving, cybersecurity leaders have worked to help keep the business protected from an onslaught of cyber threats designed to prey on the disruption and uncertainty caused by COVID-19.

Azure you shot an ARO through our hearts... Confidently observe and secure Azure Red Hat OpenShift with Sysdig and Arctiq

It has arrived! Azure Red Hat OpenShift 4 is here and generally available; now, how do you add even more granular security and faster time to repair (MTTR) for your teams? Sysdig, that’s how!

SCP - Familiar, Simple, Insecure, and Slow

SCP? It’s that handy file-transfer feature of SSH, right? Well, not quite. It’s more of a hack. Or an undocumented, unstandardized mashup of two protocols. Let’s look at the exciting (and scary) details. Secure Copy Protocol (SCP) allows us to move files (and directories) between two computers. Using it is straightforward: This will copy local_file.txt to another computer (usually a server) with domain name remote_host into the /home directory.

Monitoring A Hybrid Workforce, The New Norm

Before Covid-19, there were many reasons why employees worked remotely. For some, it was about removing distractions, and for others, it was about maintaining a healthy work-life balance. But as the world starts to reopen, companies now need to decide whether they continue to allow employees to work remotely or not. According to SHRM, 50% of companies recently surveyed, intend to keep offering a hybrid work arrangement, which means that organizations will need to find ways to monitor and manage employees while they’re in the office or at home. The benefits and challenges of a hybrid workforce Gauging employee productivity and engagement using technology How remote monitoring tools can provide metrics for companies of all sizes

On-Demand Webinar: Extending Your Fortigate Next-Gen Firewall to Kubernetes

Companies are leveraging the power of Kubernetes to accelerate the delivery of resilient and scalable applications to meet the pace of business. These applications are highly dynamic, making it operationally challenging to securely connect to databases or other resources protected behind firewalls. Tigera and Fortinet have joined forces to solve this operational challenge. With the combination of FortiGate Next-Gen firewalls and Calico Enterprise, you gain full visibility into the container environment and can define fine-grained policies to determine which Kubernetes workloads are allowed to talk to the enterprise’s crown jewels running outside the Kubernetes cluster.

Amazon Web Services Mitigated a 2.3 Tbps DDoS Attack

Amazon Web Services (AWS) said that it mitigated a distributed denial-of-service (DDoS) attack with a volume of 2.3 Tbps. In its “Threat Landscape Report – Q1 2020,” AWS Shield revealed that its team members had spent several days responding to this particular network volumetric DDoS attack. In Q1 2020, a known UDP reflection vector, CLDAP reflection, was observed with a previously unseen volume of 2.3 Tbps.

Copied master key forces South African bank to replace 12 million cards

Fraudsters stole more than $3.2 million from the banking division of South Africa’s post office, after – in a catastrophic breach of security – employees printed out the bank’s master key. According to South African media reports, the security breach occurred in December 2018 when a copy of Postbank’s digital master key was printed out at a data center in Pretoria.