Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Top 7 Security Measures That Payment Gateways Use

Handling sensitive data, compliance, and security is always front of mind for payment gateways. Technology is nowadays a double-edged sword. Just as digital advancement has revolutionized global commerce, so too have the tactics that cybercriminals use to defraud merchants and customers. A study by PWC, Global Economic Crime and Fraud Survey 2020, found that 47% of respondent companies experienced some form of fraud, resulting in US$42B of losses.

How Compliance Professionals Uses Egnyte

Chief Security Officer Kris Lahiri showcases how he uses Egnyte for compliance. This video shares how to assign data owners, monitor data governance, and manage content’s lifecycle. This video showcases how users can easily assign data owners to manage rules of engagement, retention policies, and monitor audits of the data. Whether utilizing content lifecycle management, setting engagement notifications, or monitoring usage, you can stay on top of tasks all within Egnyte.

Strengthening our investment in customer security with a $1 million bug bounty

At 1Password, we’re committed to providing an industry-leading security platform for both businesses and families. That’s why today, we’re announcing that we’ve increased our top bug bounty reward with Bugcrowd to $1 million. With this investment, we’re further bolstering our ongoing efforts to keep 1Password customers as secure as possible.

Detecting HermeticWiper

As stated in our previous threat advisory STRT-TA02 in regards to destructive software, past historical data suggests that for malicious actors to succeed in long-standing campaigns they must improve and add new ways of making their payloads stealthier, resistant, and damaging. HermeticWiper introduces some unique features, applying destructive actions on compromised hosts.

How to Set-up an Identity-Aware Access Proxy as a Bastion Host in AWS

More and more business-critical applications run on Amazon Web Services. Protecting these mission-critical applications from potential attacks requires moving beyond typical security approaches such as using only a jump box or firewall to control access. This multi-part tutorial will show how DevOps teams can secure their AWS services using a zero-trust, identity-based approach that not only increases security, but improves developer productivity.

SecurityScorecard Discovers new botnet, 'Zhadnost,' responsible for Ukraine DDoS attacks

SecurityScorecard (SSC) has identified three separate DDoS attacks which all targeted Ukrainian government and financial websites leading up to and during Russia’s invasion of Ukraine. Details of these DDoS attacks have not yet been publicly identified.

Tripwire Change Analyzer Quick Start

Tripwire Change Analyzer automates the verification and promotion of “known good” and business as usual changes that are the result of software updates, upgrades, and patches, saving IT organizations time, reducing human error, and increasing efficiency. Tripwire Change Analyzer also works in concert with Tripwire Enterprise to deliver alert notifications and granular details needed for rapid response when unexpected, unauthorized, or high-risk changes are detected. Check out this quick start tutorial video on how to get started with using Tripwire Change Analyzer.

Know your environment: Tenable/Corelight integration for prioritized IDS alerts

One of the major causes of alert fatigue for SOCs is a class of alerts that fall in between false positives and useful detections: when an actual attack has been launched, and the detection is working correctly, but the host on the receiving end is not vulnerable, guaranteeing that the attack will fail.