Could A Data Breach Land Your CISO In Prison?
Blog Published: 03/03/2023
Originally published by F5. Written by Gail Coury. On November 9, 2022 Twitter CISO Lea Kissner resigned along with the company’s chief privacy officer and its chief compliance officer. The Washington Post and other media outlets reported that internal Slack messages at Twitter revealed seriou...
Identities: The New Enterprise Perimeter
Blog Published: 03/03/2023
Written by Lior Yaari, Cofounder and CEO of Grip Security. Originally published on Forbes. In cybersecurity, the enterprise perimeter is the point where a company’s defenses begin. In the past, this was a physical perimeter defined by the company’s network, or a managed endpoint when the emplo...
Unity, Data, Focus, Culture: Important Steps to Build Organizational Resilience
Blog Published: 03/03/2023
Originally published by Google Cloud. Written by Sahana Sarma, Managing Director, Customer Value and Transformation Advisory, Google Cloud. It takes the right mix of teamwork and technology to get organizational resilience right. Here's five steps to help jump-start the process. Organizational...
Security Advisory: Insufficient Forensic Visibility in GCP Storage
Blog Published: 03/08/2023
Originally published by Mitiga. Written by Veronica Marinov. Overview As part of Mitiga’s research into cloud attacks and forensics, we have been examining potential data exfiltration techniques in GCP (Google Cloud Platform) and how to identify and investigate them. During this research, we d...
How a Multi-Processor Strategy Can Improve Your Authorization Rates
Blog Published: 03/09/2023
Originally published by TokenEx. Written by Valerie Hare. Consumers used credit and debit cards for 57 percent of total payments in 2021. It’s no surprise digital commerce continues to increase due to the convenience of cards. While there are multiple benefits to a surge in card transactions, ...
What the FedRAMP Authorization Act Means for Organizations
Blog Published: 03/10/2023
Originally published by A-LIGN. Written by Tony Bai, Federal Practice Lead, A-LIGN. Since its creation in 2011, the Federal Risk and Authorization Management Program (FedRAMP) has provided a standardized government-wide approach to assessing the security of cloud computing services. However, d...
What Is CIAM, And Why Is It Essential for Your Business Growth?
Blog Published: 03/06/2023
Written by Sara Sokorelis, Thales. Digitization has radically altered how we work and do business. Widespread cloud usage, flexible work models, and omnichannel communication have unprecedentedly enabled us to operate online. Due to digital age demands, today’s businesses need to reinvent them...
When Being Attractive Gets Risky – How Does Your Attack Surface Look to an Attacker?
Blog Published: 03/06/2023
Originally published by Pentera. Written by Maor Idan. In the era of digitization and ever-changing business needs, the production environment has become a living organism. Multiple functions and teams within an organization can ultimately impact the way an attacker sees the organization’s ass...
4 Tips for Improving Cloud Security
Blog Published: 03/07/2023
Originally published by InsiderSecurity. Cloud security protects critical applications and data from attacks and unauthorized access. It is especially important since at least 50% of data worldwide is stored and processed in the cloud, and 60% of enterprises have implemented multi-cloud infras...
Attackers Don't Hack, They Log In.
Blog Published: 03/09/2023
Originally published by Sonrai Security. Written by Eric Kedrosky. Lessons from the LastPass Breach Below we’ll detail the latest LastPass incident, discuss the implications of this attack, and finally recommend how organizations can protect their critical cloud assets.What HappenedThe threat ...
Who You Gonna Call (For DataSec)?
Blog Published: 03/10/2023
Written by Ravi Ithal, Cofounder and Chief Technology Officer, Normalyze. Originally published on Forbes. My title plays on the refrain of Ghostbusters, a #1 hit dance/pop song in a blockbuster comedy film with a trio of parapsychologists who set up a ghost removal service in New York. Cyberse...
NIST Releases New Framework for Organizations Associated with AI Technologies
Blog Published: 03/07/2023
Originally published by BARR Advisory. Written by Kyle Cohlmia. On January 26, 2023, the National Institute of Standards and Technology (NIST) released the Artificial Intelligence Risk Management Framework (AI RMF 1.0). According to NIST, the framework was developed in collaboration with priva...
When is SD-WAN Zero Trust and When is it Not?
Blog Published: 03/08/2023
Originally published by CXO REvolutionaries. Written by Gary Parker, Field CTO - AMS, Zscaler. Deploying a standalone SD-WAN might seem reasonable given the way workers connect today. Many of today's knowledge workers are returning to branch offices, while others still work remotely more often...
How Attackers Can Exploit GCP’s Multicloud Workload Solution
Blog Published: 03/08/2023
Originally published by Ermetic. Written by Liv Matan. IntroductionWhen integrating with other workloads, it is never a good idea to send secrets over the network and hard code them. Massive breaches leveraging credentials stolen from GitHub, local machines and other sources have already shown...
CISO: A Job in Search of a Description
Blog Published: 03/13/2023
By Manuela Italia, Co-Chair of CSA Italy's CisoRM Working Group The massive increase in cyber attacks' volume and complexity accelerated by various and recent global events and new pressures coming from authorities and regulations are pushing organizations to discover and establish a CISO role...
Is Your Digital Transformation Secure? How to Tell if Your Team is on the Right Path
Blog Published: 03/14/2023
Originally published by Google Cloud. Written by David Stone, Office of the CISO, and Anton Chuvakin, Security Solution Strategy, Google Cloud. In our Security Leaders Survival Guide, we answer the tough questions about how to weave security throughout your digital transformation Digital trans...
How to Protect Against SMS Phishing and Other Similar Attacks
Blog Published: 03/14/2023
Originally published by Lookout. Written by Hank Schless, Senior Manager, Security Solutions, Lookout. Last year, cloud communications company Twilio announced that its internal systems were breached after attackers obtained employee credentials using an SMS phishing attack. Around the sam...
Factors to Consider When Choosing the Right Equipment for the Access Control System
Blog Published: 03/10/2023
Written by Alex Vakulov When building an access control system, the determining parameters are speed, reliability, and ease of use. Modern access control system architecture In modern access control systems, communication between controllers, user workstations, and the system server is often c...
The Challenges of Cloud Detection and Response
Blog Published: 03/13/2023
Originally published by TrueFort. Written by Nik Hewitt. Detecting unexpected behavior in a cloud environment is often challenging due to the lack of instrumentation and the continual churn of devices and applications. Being able to separate legitimate attacks from everyday ‘noise’ is a critic...
How to Prepare for ISO/IEC 27001:2022
Blog Published: 03/15/2023
Originally published by Schellman.When it comes to ISO/IEC 27002:2022 recently, it felt a bit like a game of Red Light, Green Light—you know, the childhood game where everyone runs to the finish line upon Green Light being called, but you had to stop on a dime when you heard “Red Light!” and a...