Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

Fireside Chat with Aon CSO Joe Martinez

In this fireside chat, Chief Security Officer Joe Martinez shares insights on how Aon approaches various technical and business issues in protecting the company’s business-critical assets. Salt Security executives Michael Nicosia, co-founder and COO, and Michelle McLean, VP of Marketing, ask Joe about far-ranging topics including: This webinar first aired on December 15, 2022.

Understanding the basics of Cloud Security: What is Zero Trust & Why does it Matter?

Cybersecurity professionals are tasked with the difficult job of protecting their organization's data from malicious actors. To achieve this goal, zero trust security has become an essential tool for organizations. But what exactly is zero trust? In this post, we’re going to separate signal and noise by disambiguating the term zero trust. We’ll talk about what it is, why it matters, and key takeaways you should have regarding the state of cybersecurity in 2023.

Trustwave Upgrades Fusion Platform Mobile App

Trustwave has updated its Fusion Platform mobile app, for Apple iOS or Android, adding a bundle of new features and enhancements designed to make monitoring an organization’s security status at any time or place even easier. The Trustwave Fusion platform is a cloud-based cybersecurity platform that serves as the foundation for Trustwave’s managed security services, products, and other cybersecurity offerings.

Top 11 API Security Best Practices to Prevent Security Threats

Building a new API for your web app is an exciting undertaking. It’s beneficial for everyone involved: the developers who want to build integrations for your app, the users who will reap the rewards of those connections, and your bottom line as more people are drawn to your network. New APIs may be beneficial for developers, but hackers also see this as an opportunity to gain unauthorized access to data stored on your servers.

AI-generated phishing attacks are becoming more convincing

It's time for you and your colleagues to become more skeptical about what you read. That's a takeaway from a series of experiments undertaken using GPT-3 AI text-generating interfaces to create malicious messages designed to spear-phish, scam, harrass, and spread fake news. Experts at WithSecure have described their investigations into just how easy it is to automate the creation of credible yet malicious content at incredible speed.

6 Tips to Setup Foolproof AWS Security Groups

Adopting cloud technologies is one of the most common tech strategies followed by modern organizations. This may be due to various reasons depending on the nature of the business. But there are a few standard components that span across most domains, not least the fact that cloud vendors allow developers to easily create and take down resources on the cloud with minimal effort.

GCP FileStore Backup for Kubernetes Persistent Volume Data on GKE Clusters

Google Cloud Provider (GCP) Filestore is a good place to keep lots of rich, unstructured data, such as graphic designs, video editing files, and other media workflows that use files as input and output. Having GCP Filestore backups enables users to protect themselves against the rare case of inaccessibility, accidental changes, ransomware attacks, or other types of disasters.

The Heightened Importance of Cybersecurity in Mobile App Development

Mobile device use is pervasive, and has eclipsed traditional computing. We often hear how various malicious mobile apps are released into circulation. For these reasons, mobile app development needs to focus on cybersecurity just as much as it does on functionality and flexibility, if not more so. It’s an inevitable aspect of app development that must be taken more seriously, as the very real threats to business proliferate.

Improve your AWS security posture, Step 2: Avoid direct internet access to AWS resources

In the first blog in this series, we discussed setting up IAM properly. Now we’re moving on to the second step, avoiding direct internet access to AWS resources. When AWS resources like EC2 instances or S3 buckets are directly accessible via the Internet, they are vulnerable to attack. For example, brute force attacks on SSH login, denial of service (DOS) attacks on server resources via Layer 3, 4, or 7 flooding, or the inadvertent disclosure of data on an S3 bucket.