Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing

I have created a comprehensive webinar, based on my recent book, “Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing”. It contains everything that KnowBe4 and I know to defeat scammers. The evidence is clear – there is nothing most people and organizations can do to vastly lower cybersecurity risk than to mitigate social engineering attacks. Social engineering is involved in 70% to 90% of all successful attacks.

Integrate Identity and Access Management with HIPAA, NIST, GDPR and CCPA in Healthcare

The healthcare sector is a top target of cyber criminals eager to steal sensitive data and extort high ransoms. The key to thwarting costly attacks is to understand that identity is the new security perimeter. By implementing robust identity and access management (IAM), healthcare organizations can significantly enhance their security and cyber resilience. This article explains the role of IAM in healthcare and details the most pressing IAM gaps to address.

Breach or Bluff: Cyber Criminals' Slippery Tactics

When the news first broke about a potential data breach at Ticketmaster, the details were murky. The Department of Home Affairs confirmed a cyber incident affecting Ticketmaster customers, but the extent of the breach and the veracity of the claims made by the hacker group ShinyHunters were unclear. As the story unfolded, it became evident that the breach was indeed real, and the personal details of millions of customers had been compromised.

Announcing Context Engine: Focus on the alerts that matter

Today, I’m delighted to announce the release of Jit’s Context Engine, which uses the runtime context of vulnerabilities to automatically prioritize the top security risks in our customers’ cloud applications. One of the defining challenges of product security is the overwhelming volume of alerts generated by code and cloud security scanners, which is especially painful when the majority of “issues” don’t pose any real security risk.

Understanding Zero Trust Network Access and Why Needs It

As flexible working arrangements become increasingly common across every industry, companies need secure, dependable ways to grant remote employees online access to company data, services, and applications. Productivity in today’s highly digital business environment depends upon employees being able to access the systems and information they need for work when needed, from any location.

Alissa Starzak on Internet regulation, elections, and Project Galileo's decade

In this week’s episode, we feature a segment all about policy, Internet regulation, and the 10th anniversary of our Project Galileo. Host João Tomé is joined by Alissa Starzak, Global Head of Policy at Cloudflare, to discuss policy and regulation in 2024. This conversation was recorded in early May 2024 in our San Francisco office. We begin with Alissa’s impressive background, from the private sector to the CIA, the US Army, and then Cloudflare.

The SIEM vs. XDR debate: industry perspectives

How many times can we say, “It’s been a busy week for the security industry,” before it becomes cliche? We recently discussed changes in the SIEM market, with mergers and acquisitions disrupting the traditional SIEM vendor landscape and XDR vendors introducing new SIEM solutions. This week, we continue to see a range of mixed messages from the market around the future of XDR and SIEM.