Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Practical advice to secure your expanding attack surface

The other week, BitSight published research identifying thousands of organizations using internet-facing and exposed webcams with many video and audio feeds susceptible to spying. The potential consequences are serious – an attacker could potentially view private activities and eavesdrop on sensitive conversations, presenting a variety of privacy and security concerns. Below are some of the screenshots BitSight captured from exposed devices (blurred for privacy).

Burnout: how to prevent, heal and deal with it

Burnout in the workplace is a growing concern as more and more employees are feeling overwhelmed and exhausted by the demands of their jobs. Burnout can manifest in a variety of ways, including physical and emotional fatigue, lack of motivation, and difficulty concentrating. It can also lead to decreased productivity, increased absenteeism, and a higher risk of mental health issues, in addition to high costs to the companies these employees work for. Burnout is more common in IT professionals due to a combination of factors, such as a lack of work-life balance, lack of recognition, inadequate compensation, and lack of autonomy.

Lose the Bias: Young Cybersecurity Experts Want a Modern Workplace That Includes Women Leaders

2023 finds us in a sustained cybersecurity hiring crisis. With 3.4 million too few experts to meet global demand, it seems the widespread investments in university programs, increased certification access, and upskilling for existing IT professionals isn’t enough to bridge the gap.

SQL Server hardening

To safeguard the SQL layer against common SQL-based attacks, including Denial of Service, Brute Force, and SQL injections, and to prevent privilege escalations, hardening the SQL server is of utmost importance. Achieving compliance and satisfying auditors also necessitates SQL hardening. By implementing SQL hardening measures at both the application and operating system levels, the organization can significantly reduce its attack surface and eliminate critical vulnerabilities.

Ultimate Security Checklist to Launch a Mobile App in the United Kingdom - iOS & Android

Mobile apps have made our lives a lot easier. From ordering food, watching movies, booking a cab, and sending money, one can do everything via mobile apps. However, while mobile apps are a great utility, they've become an easy target for scammers, hackers, and cyber attackers, especially in countries like the UK. Taking charge of the situation, the UK government has created strict guidelines for enhancing the security of mobile apps.

How CIAM safely orchestrates your customers' journey and its benefits

Customers’ willingness to give you their personal data begins with the experience they receive. Convincing them requires the right tone, an outlook of what they’ll get in return, and most importantly, a high level of trust. But while companies depend on customer data to unlock growth, user-centric data collection can be tricky. 43% of U.S.

SharePoint Security: 8 Most Common Vulnerabilities

Once written off as a failed CMS incapable of generating a significant user base, Microsoft’s SharePoint has continually defied expectations to become one of the most widely-used ECM and Collaboration products ever. It caters to over 200 million users and 250,000 organizations, including 85% of Fortune 500 companies. SharePoint is a user-friendly intranet portal and provides a consolidated center for document sharing, tracking, and overall project management.

Guidelines: How to reduce the noise of Falco rules in Sysdig Secure

Rule tuning is one of the most important steps during the definition of the security posture. With the detection rules, it’s impossible to use a “one fits all” approach: every customer has a unique environment, with its peculiarities and business needs. So, when a new rule is released it’s crucial to understand the security use case behind the detection and reduce the false positives (FP) as much as possible. The Threat Research Team constantly checks if noise occurs.