Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Is VPN or Zero Trust Access Best for Remote Working Security?

The pandemic changed the way people work, and many companies have been fast to adapt to this shift in work culture by encouraging and promoting remote and hybrid work. Zero Trust Network Access or ZTNA is gaining popularity as a secure alternative to corporate VPN-based access to the internal application and network services.

Three Lessons from the Confluence Server Vulnerability (CVE-2022-26134)

Recently, Atlassian issued a major security notice to all of its users about a critical vulnerability, identified as CVE-2022-26134, in its widely-used Confluence Server solution. The vulnerability would allow an unauthenticated malicious actor to execute arbitrary code on a Confluence Server or Data Center instance that could grant an attacker full command of the vulnerable server.

Viking Yachts Protects Intellectual Property From a Departing Employee (Case Study) | CurrentWare

“CurrentWare saved us a lot of time and money; when the employee was questioned about the data transfer they folded. I cannot thank all of you enough for this software. Being able to audit removable drives is invaluable.” A lot has changed in the world since our first case study interview in 2021 with Vincent (Vinny) Pecoreno, the Network Administrator for Viking Yachts.

Rise of the Secure Developer from Atlassian Team '22: Tomás González - Partner Solution Architect

This talk by Tomas Gonzalez, partner solutions architect at Snyk, talks about the rise of the security-conscious developer - someone who champions the use of new cloud technologies with a security mindset. This doesn’t mean developers are solely responsible for security risk management in isolation; secure developers are aware of risk management processes, are armed with the right technology to enforce them, and apply a shared-responsibility mentality to enable an agile, thriving secure business.

Detectify wins 2022 Fortress Cyber Security Award

Surface Monitoring is a leading external attack surface management (EASM) product aimed at identifying, assessing, and prioritizing web vulnerabilities. This new category of cybersecurity products provides a layer of protection that was previously unavailable to organizations due to a lack of automation and tools. Surface Monitoring was conceived based on the success of a previous security product from Detectify that had been in the market since 2015.

Top Cyber Attacks of May 2022

Summer is here and phishing season is in full swing. May saw a troubling range of phishing attacks carried out against a wide array of targets, from retirement planners to school systems to national defense. Bundle all of those efforts together with a disturbing ransomware attack on the air travel industry and you have all the evidence you need of the dangers of inadequate cybersecurity at every level.

Data Privacy Laws Impact Every Business-Including Yours

With the rapid proliferation of data privacy laws, it’s no wonder mid-sized organizations are having a hard time keeping up with all of the new regulations. In addition, many companies struggle with understanding how rapidly evolving legislation might apply to them. For example, if you’re a U.S.-based company that does business from North Dakota, you might not be concerned about privacy laws abroad.

Announcing Cybersecurity Infrastructure Grants

At LimaCharlie, we believe that for the cybersecurity industry to innovate, people need cost-effective access to security infrastructure. In the same way that the emergence of cloud computing has enabled small teams to access the computing power that was previously only available to large enterprises, access to scalable cybersecurity infrastructure will enable more security professionals to build the future they believe in.

Exceptions Should Not Become The Rule

It is a sentence I hear a lot; “We treat Microsoft 365 as an exception in our cloud security because it is a managed app.” You might think that’s a reasonable approach to take, after all Microsoft’s security credentials are impressive, all OneDrive app traffic is encrypted, and there are plenty of other unmanaged cloud applications in use as shadow IT all over your organisation that pull your attention.