Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

5 Examples of IP Theft & How To Protect Your Business

The business world continues to move to a knowledge-worker-based economy. Companies derive less and less value from widgets and more from the processes, ideas, and innovations they create — their intellectual property (IP). But IP needs to be protected. IP theft is the appropriation of unique ideas, inventions, or theft of trade secrets, usually by malicious insiders.

Augmented Reality and Privacy: What You Need to Know

Sometimes, we need to escape the reality of the real world and detach from reality. In this world centered around technology, fewer people are relaxing by candlelight with a good book, and more are choosing to substitute the physical world by bringing in elements from augmented reality. Unfortunately, the privacy issues we face in the real world from companies are still present in augmented reality.

Massive Fraud Campaign Uses 700+ Domains to Scam Olympic Games Ticket Buyers

A large-scale fraud operation, dubbed "Ticket Heist," is exploiting over 700 domain names to sell fake tickets for the upcoming Summer Olympics in Paris. This campaign, which appears to predominantly target Russian-speaking users, extends beyond the Olympics to other major sports and music events, posing a significant risk to potential ticket buyers. Details of the Ticket Heist Campaign.

The Financial Burden of Bots on Streaming Services

Business leaders often see security as an insurance policy – a box that CISOs need to tick just in case the organization comes under attack. This make it difficult for InfoSec decision makers to justify the cost of upgrading defenses. After all, we already ticked that box – right? But when it comes to automated attacks, it’s not a matter of “if” bots will target your business. It’s not even a question of “when”.

Managing Open Source Costs: The CISOs Guide to Efficient and Effective Security Operations

Open source software offers numerous benefits, including flexibility and cost savings, but managing, maintaining, and scaling these tools can become a significant burden for CISOs. As open source solutions proliferate within your organization, the associated costs and complexities can spiral out of control. This webinar will address the challenge of managing open source costs and how LimaCharlie can provide the efficiencies needed to keep these expenses in check.

Tech Talk: Behind the curtain - Obfuscating Linux Symbols

This is a Bulletproof Tech Talk article: original research from our red team covering issues, news, and tech that interests them. It’s more technical and in-depth that our usual blog content, but no less interesting. This blog looks at obfuscating Linux Symbols using dl_iterate_phdr with callbacks. It represents original security research from the Bulletproof Red Team.

18 Types of Employee Fraud & How To Prevent Them

Employee fraud is not just a rare occurrence, but a prevalent issue in the American workplace. Shockingly, three out of four employees have confessed to stealing from their workplace at least once for personal gain. The types of fraud are diverse, ranging from petty theft to complex schemes involving benefits, accounts receivable fraud, or intellectual property. The risk of employee fraud affects both small and large businesses.

What Is a Password Manager?

A password manager is a solution that helps users securely store, manage and share their login credentials. Some password managers also aid in securely storing additional data such as passkeys, documents, files and images. You may be familiar with browser-based password managers, which are the ones built into your browser. Or if you’re an iPhone user, you may be more familiar with the password manager built into your phone called iCloud Keychain.