Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Integrating ESG Into a TPRM Program: Mitigating Operational Risk

Environmental, social, and governance (ESG) is a framework that holistically assesses the sustainability of a business or investment. Investment groups, business continuity planners, enterprise risk management personnel, and third-party risk management (TPRM) programs utilize ESG to manage sustainability risks.

What Is Email Spoofing and How Does It Work?

Email spoofing is a type of cyber threat where a cybercriminal sends emails to potential victims using fake sender addresses. Email spoofing works by forging a sender address to make it seem as though it’s coming from a legitimate person or company. Email spoofing is a tactic typically used by cybercriminals when carrying out phishing attacks to encourage their targeted victim to send them sensitive information.

Trustwave's 2023 Retail Threat Intelligence Report: Gaining Access

The Trustwave SpiderLabs team's recent in-depth look at the threats facing the retail landscape has uncovered a wide array of adversaries actively attacking this sector along with their tried-and-true methods of gaining access, moving laterally, and finally exfiltrating valuable data. This information is thoroughly detailed in the Trustwave Threat Intelligence Briefing: The 2023 Retail Services Sector Threat Landscape.

No One Knows How Online Pharmacy Company was Hit with a Data Breach Impacting 2.3 Million Customers

This is a cautionary tale of both how your data can legally end up in the hands of an organization you never intended and how victims can be largely left in the dark post-breach. Normally when there’s a press release from an organization hit by a data breach, there are at least a few details that let customers know the company has a handle on what transpired, that the breach has been mitigated, and what customers impacted should do to protect themselves.

The best security events to attend in 2024, according to security pros

With security team workloads increasing year-on-year, it’s no surprise that practitioners are selective about the cybersecurity events and conferences they attend. But despite reporting high levels of understaffing and burnout, most security pros find the time to attend these events. According to the 2023 Voice of the SOC report, which surveyed 900 practitioners in the US and Europe, 81% have attended at least one conference in the past two years.

Amazon's AI Gold Rush: Profits vs. Consequences - Tackling the Hidden Costs for a Sustainable Future

Dive deep into the heart of the AI Gold Rush in our latest video as we unravel the complexities of an industry where profits are soaring, but at what cost? Andre Harwitz sheds light on a staggering revelation: a whopping 80% of generative AI startup investments are channeled into compute costs, with a single GPT 3.5 training run reaching an astounding $3.8 million.

Improving security and efficiency with IDaaS

Join Stuart Sharp, OneLogin VP of Product, as he explores Identity as a Service (IDaaS) and its role in supporting the growth of Software as a Service (SaaS). Sharp covers how IDaaS can improve identity management efficiency, help save on maintenance costs and secure user identities in the Cloud.

Unveiling the MOVEit Vulnerability

In the ever-evolving landscape of cybersecurity, staying ahead of potential threats is a perpetual challenge for businesses. One recent vulnerability that has sent shockwaves through the corporate world is the MOVEit vulnerability. This flaw, discovered in widely used file transfer software, has had a profound impact on companies across various industries.

The Role of Artificial Intelligence in Cybersecurity

The integration of artificial intelligence (AI) into various domains has become ubiquitous. One area where AI’s influence is particularly pronounced is in cybersecurity. As the digital realm expands, so do the threats posed by cybercriminals, making it imperative to employ advanced technologies to safeguard sensitive information.