Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Ivanti EPM Cloud Services Appliance - Taking advantage of a backdoor to detect a vulnerability

At Bitsight, part of the Vulnerability Research team's core work involves analyzing vulnerabilities in order to create detection capabilities that can be implemented on an Internet-wide scale.

Offensive AI Lowers the Barrier of Entry for Bot Attackers

The use of artificial intelligence (AI) for defense allows for the better scanning of networks for vulnerabilities, automation, and attack detection based on existing datasets. However this is all in defense against an unknown attacker, who can have varying offensive tools all designed to overcome the most sophisticated defense. Is the biggest challenge for defensive AI that there is an offensive AI operator with unknown capabilities? And has offensive AI lowered the barrier of entry for bot attackers?

Top 10 app security problems and how to protect yourself

You know your latest web application is inherently vulnerable to all kinds of attacks. You also know app security can never be perfect, but you can make it better tomorrow than it was yesterday. The problem is that whether you’re using enterprise-grade (aka, expensive and complex) security tools, or have cobbled together a handful of open-source projects into a CI/CD pipeline or Git commit hooks and are hoping for the best, your toolkit can’t help you see.

Ticker News: Major 2024 Cybersecurity Concerns With Loris Degioanni, Sysdig

Loris Degioanni, CTO and Founder of Sysdig, stopped by the Ticker News studio to discuss the major cybersecurity concerns of 2024. In the cloud, attacks are fast. Companies have 5 seconds to discover an attack, 5 minutes to investigate, and 5 minutes to respond. How can companies secure their environment when keeping pace with the speed of the cloud?

China Threat Actor Targeting African and Caribbean Entities With Spear Phishing Attacks

The China-aligned threat actor “Sharp Dragon” is launching spear phishing attacks against government entities in African and Caribbean countries, according to researchers at Check Point. “In recent months, we have observed a significant shift in Sharp Dragon’s activities and lures, now targeting governmental organizations in Africa and the Caribbean,” the researchers write.

KnowBe4 Free Tools Now Available On CISA's Website

We are big fans of the U.S. Cybersecurity Infrastructure Security Agency (CISA), whose informal slogan of “An organization so committed to security that it’s in our name twice” is a source of pride. CISA is a non-regulatory government agency dedicated to protecting U.S. and global infrastructure and organizations against malicious hackers and their malware (and other types of threats).

Complying With the New SEC Cybersecurity Regulations: A How-to Guide

‍Since the SEC's latest cybersecurity regulations went into effect, thousands of companies have already been compelled to submit their annual Form 10-K with the novel Item 1C. Similarly, dozens of organizations have filed updated Form 8-Ks to disclose cybersecurity incidents. Slowly but surely, these public reports are helping investors become more aware of the intrinsic relationship between cyber risk and market value.

5 Best Tools for Digital Nomads to Work Securely From Anywhere

The allure of the digital nomad lifestyle has attracted over 40 million people worldwide looking to escape the office and work from the beach, inner city, or remote islands. Obviously, a decent laptop and a stable internet connection are required for this lifestyle. Outside of these, there are more tools for digital nomads they should bring with them as they travel the globe. These tools relate to: However, security and privacy are important concerns for digital nomads working in unfamiliar places.

Data Privacy in Online Marketing: What Is Changing & How to Adapt?

Thanks to digital innovations, we can easily connect online, but they also leave us increasingly vulnerable and exposed.68% of consumers are concerned about the volume of data businesses collect about them, with 40% expressing a lack of trust in companies’ ethical handling of data. Therefore, it’s no surprise that data privacy regulations are constantly improving.