Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

How Woodforest National Bank Uses INETCO Real-time Transaction Monitoring and Analytics Solutions to Analyze Card Usage and Manage ATM Performance

To Woodforest National Bank, “relationship banking” is everything. As one of the strongest community banks in the USA, they are well known for their hundreds of retail branches located within prominent operators of big box retail and grocery stores. In addition to 700 branches in 17 different states, their electronic payments line of business includes a multi-vendor fleet of 850+ ATMs and payment card issuance platforms.

Weekly Cyber Security News 15/11/2019

A selection of this week’s more interesting vulnerability disclosures and cyber security news. There’s leaving a few API keys in a GitHub repo, and there’s leaving everything on Pastebin. The question then is who did it? Staff, hacker or 3rd party? Perhaps we will never know. Do we however have a moral of the story here? Maybe just don’t write everything down in the clear (and give it to someone)…

What is Spear Phishing?

Spear phishing is an email spoofing attack targeting a specific organization or individual. Spear phishing emails aim to infect the victim with malware or trick them into revealing sensitive data and sensitive information. Spear phishers look for target who could result in financial gain or exposure of trade secrets for corporate espionage, personally identifiable information (PII) for identity theft and protected health information (PHI) for insurance fraud.

Securing Google Cloud Run serverless workloads

Google Cloud Run is a serverless compute platform that automatically scales your stateless containers. In this post we are going to showcase how to secure the entire lifecycle of your Cloud Run services. Sysdig provides a secure DevOps workflow for Cloud Run Platforms that embeds security, maximizes availability and validates compliance across the serverless lifecycle. Sysdig Secure Devops Platform is open by design, with the scale, performance and usability enterprises demand.

Netwrix Auditor 9.9 - Visibility into Office 365 Permissions

Visibility into SharePoint Online, OneDrive for Business and Exchange Online permissions, available in Netwrix Auditor 9.9, gives you a clear picture of who has access to what so you can enforce the least-privilege principle and ensure that your critical data is not overexposed. Keeping your critical data secure in Office 365 is not easy, in part because of the intricate system of issuing permissions there. How can you ensure that your SharePoint Online documents are not shared with external users? How can you quickly make sure that your CEO’s messages are not overexposed?

Netwrix Auditor for Office 365 - Overview

Netwrix Auditor for Office 365 delivers complete visibility into what’s going on in your Office 365 environment. This insight empowers organizations to see who has access to what, monitor user activity in SharePoint Online, and audit all modifications and non-owner mailbox access events in Exchange Online to enhance the security of their critical data, continuously ensure business availability and prove compliance with less effort.

Aligning SECaaS with Your Organization's Cloud Security Needs

One cannot underestimate the effect that the ongoing skills gap is having on organizations’ digital security strategies. Gartner estimates that the global number of unfilled digital security positions is expected to grow to 1.5 million by 2020. Reflecting this trend, more than 70 percent of organizations feel that hiring skilled infosec personnel became harder between 2017 and 2019.