Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Skewed Analytics Leads to Bad Marketing | Cybersecurity Sessions #13 with Matt Wilkinson

In a recent Netacea report, 60% of businesses reported a minor financial impact caused by bots skewing their analytics, and with the busiest eCommerce period of the year fast approaching, businesses need to fight back. How do bots affect businesses’ data, marketing campaigns and paid media planning? Host and Principal Security Researcher Cyril Noel-Tagoe is joined by Spike’s Head of Paid Media Matt Wilkinson to discuss the effect bots will have on marketing analytics this Black Friday and how to keep your enterprise’s analytics safe from automated threats during periods of peak traffic.

Building a Modern AppSec Program: AWS-Mend Fireside Chat

The modern approach to application security includes strategies and technologies that help development teams prioritize the vulnerabilities they should address and fix. By giving these teams tools that efficiently identify security vulnerabilities that present the biggest risk, they can address them as quickly as possible. Ori Bach, EVP of Product at Mend, and Harry Mower, Director, AWS CodeSuite, got together for a fireside chat to discuss how to implement these strategies.

Using Sysdig Secure to Detect and Prioritize Mitigation of CVE 2022-3602 & CVE 2022-3786: OpenSSL 3.0.7

The awaited OpenSSL 3.0.7 patch was released on Nov. 1. The OpenSSL Project team announced two HIGH severity vulnerabilities (CVE-2022-3602, CVE-2022-3786), which affect all OpenSSL v3 versions up to 3.0.6. These vulnerabilities are remediated in version 3.0.7, which was released Nov. 1. The vulnerabilities fixed include two stack-based buffer overflows in the name constraint checking portion of X.509 certificate verification.

Avoiding the Dangers of the Dark Web

We’ve all heard of the “dark web,” but many of us have no idea what it is and even less of how to access it. The Dark Web, a global challenge to law enforcement, is a region of the World Wide Web accessible only through special software permitting anonymity. Your search engine cannot index the Dark Web’s pages. They are not viewable on your standard web browser, requiring special software or configuration for access.

How long does a SOC 2 audit take?

The length of an average SOC 2 audit depends on a lot of variables, but with Vanta, customers can get a SOC 2 Type I report in weeks, and a SOC 2 Type II report within months. ‍ Audit timelines are difficult to project because each organization has different capabilities, resources, and goals. But after helping thousands of businesses tackle SOC 2 audits, we’ve developed a reliable timeline of what most customers can expect. ‍

The ultimate price: The morality of paying your attacker their ransom

“Have you backed up your files?” If you had a Dirham for every time you heard this and followed up with immediate action, you’d be a Shiekh by now. But alas, we’re here because you didn’t do your due diligence and now you have to pay the ultimate price—your data has been compromised and you’ll have to decide what to do about it. But don’t feel too bad; data backup at a corporate level is a luxury not everyone gets to enjoy.

Refrain From Downloading These Top Grossing Malicious Apps on Google Play

Google Play is every Android’s first go-to option for downloading apps. However, even this ever-famous application portal isn’t free from malicious apps directed toward conning the installers. A renowned security firm, Malwarebytes Labs, has warned users against downloading and using these top four applications, which have collectively garnered 1 million downloads. Per the security researchers at the firm, these apps hide Trojans, which serve adware and direct users to phishing sites.

What many recent data breaches have in common

When a data breach appears in the news (which has happened a lot recently), many of us picture a hacker in a black hoodie, trawling through reams of code on a custom-built PC. We often imagine them finding a single mistake – a zero that should be a one, or vice versa – that lets them slip through a company’s defenses.