Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Ethical hacking & bug bounty hunting | Cybersecurity Sessions #11 with Jessica Haworth

Cyber-criminals are relentless, and the number of attacks is growing. Businesses are increasingly turning to ethical hackers to find bugs and exploits before attackers do, offering financial incentives for their efforts. As a security researcher, our host Cyril Noel-Tagoe is always on the hunt for new vulnerabilities. He’s joined for this episode by ethical hacking enthusiast and Daily Swig reporter Jessica Haworth, who has a finger firmly on the pulse of the latest bug bounty programs and developments.

What is Digital Onboarding? Why is it transformative for businesses?

Few things are more crucial for internet businesses than the Digital onboarding procedures for user online. You invest a lot of money into getting people to visit your website, and many companies dedicate entire departments to optimizing it so that visitors turn into customers. Nothing could be further from the truth: the onboarding phase is essential not only for your customer journey but also for fraud and risk reasons.

Offensive Security Migrates to The Underground

Recent years have taught us a lot about espionage in the cybersecurity world. As offensive security companies emerged at almost the same rate as ransomware groups, some got tangled up in diplomatic and political incidents, to a point where the countries that hired them left having to manage their losses. Over the past months, a new trend has emerged of criminal threat groups claiming to have connections to governments worldwide that hire their services for espionage and targeted data leak campaigns.

Announcing Major Upgrades to KeeperMSP

Keeper is pleased to announce significant new upgrades to the KeeperMSP Platform that offer robust security and compliance solutions through an expanded portfolio of Keeper zero-trust security capabilities. These market-leading features will help Managed Service Provider (MSP) partners oversee security and compliance for their customer base in an increasingly challenging threat landscape. These platform enhancements include the following powerful add-on features and products.

As Seen in ITWeb: ABAC vs RBAC: How to create data security, avoid permission creep

Demands on data have created a host of challenges for security and administration, and traditional tools are not keeping up. As we expand collaboration and business activities outside the office, data moves more widely and user permissions expand with every responsibility or team project. Keeping ahead of this permission burden is tough yet necessary for zero trust “don’t trust, verify” security.