Zero Trust in the Cloud: Why Total Context Matters
Blog Published: 01/11/2024
Originally published by Reco.Written by Dr. Chase Cunningham. In recent years, the cloud has become the go-to platform for businesses of all sizes. The agility, scalability, and cost-effectiveness it offers are undeniable advantages. However, this rapid shift to the cloud has also exposed orga...
An Analysis: 3 Breaches and the Role of Cloud Permissions
Blog Published: 01/12/2024
Originally published by Sonrai Security. Written by Tally Shea. Good security has long been about creating a barrier to entry. It’s been about ‘keeping them out.’ The spotlight, attention, and budget, has been dedicated to that pivotal moment – whether the perimeter is breached or not.This app...
Cybersecurity 101: 10 Types of Cyber Attacks to Know
Blog Published: 01/11/2024
The first step of handling any problem is to know what you’re dealing with. So, here are the definitions for 10 different types of cyber attacks that we think you should know about:1. Account TakeoverAn attack where a malicious third party gains access to a legitimate online account. This allo...
2024 Security Predictions
Blog Published: 01/12/2024
Originally published by DigiCert on November 8, 2023.As 2023 draws to a close, it’s time once again to look back on the past year’s security developments and make some bold predictions about the future of technology, identity and digital trust.Artificial intelligence (AI) was all over the news...
Top 5 Non-Human Access Attacks of 2023
Blog Published: 01/16/2024
Originally published by Astrix. Written by Tal Skverer & Danielle Guetta. 2024 is here, and before we delve into new year resolutions and looking to the future, we wanted to take a moment and look back at some of the most high profile non-human access attacks in 2023, rank the top 5, and s...
AWS’s Hidden Threat: AMBERSQUID Cloud-Native Cryptojacking Operation
Blog Published: 01/16/2024
Originally published by Sysdig.Written by Alessandro Brucato. The Sysdig Threat Research Team (TRT) has uncovered a novel cloud-native cryptojacking operation which they’ve named AMBERSQUID. This operation leverages AWS services not commonly used by attackers, such as AWS Amplify, AWS Fargate,...
SaaS and Compliance
Blog Published: 01/17/2024
Originally published by Suridata.Written by Haviv Ohayon. If your business is subject to compliance, whether it’s based on the law or industry rules, your Software-as-a-Service (SaaS) applications will be part of the picture. Like any other area of the IT estate, your SaaS apps must enable com...
What Got Us Here: A CISO's Perspective
Blog Published: 01/17/2024
Originally published by CXO REvolutionaries. Written by Ben Corll, CISO in Residence, Zscaler.I recently read “What Got You Here Won't Get You There” by Marshall Goldsmith. The book's premise, as the title suggests, is that the things that got you where you are today may not get you where you ...
Predicting Monthly CVE Disclosure Trends for 2024: A Time Series (SARIMAX) Approach
Blog Published: 01/19/2024
Written by Yamineesh Kanaparthy. A Short BackstoryIf you have clicked to read this, you might be familiar with CVEs already. If you are not, CVE stands for Common Vulnerability and Exposure. In simple terms, a security flaw. A unique Identifier called ‘CVE ID’ is assigned and published by the ...
PCI DSS 3.2 vs. 4.0—Understanding the Difference and How to Prepare for the Updated Version
Blog Published: 01/22/2024
Originally published by BARR Advisory. Written by Kyle Cohlmia. The 2023 Verizon Payment Security Report (PSR) found that fewer than half of organizations are able to maintain sustainable control environments. According to the PSR, this statistic demonstrates that too many organizations don’t ...
The New U.S. Policy for Artificial Intelligence: Thoughts on the White House Executive Order and its Implications for Cybersecurity
Blog Published: 01/22/2024
Originally published by CrowdStrike and SC Magazine on November 21, 2023.The major news in technology policy circles is this month’s release of the long-anticipated Executive Order (E.O.) on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence. While E.O.s govern po...
Six Tips for Segregating and Securing Your Dev, Testing and Production Environments
Blog Published: 01/23/2024
Originally published by Tenable. Written by Moshe Ben Dahan. As organizations move applications and data to the cloud, a key challenge they face is how to segregate their cloud environments, especially when it comes to development, testing and production. It’s worth overcoming the challenge,...
Whole-of-State Cybersecurity: What it Means and Why it Matters
Blog Published: 01/24/2024
Originally published by CXO REvolutionaries. Written by David Cagigal, Former CIO of the State of Wisconsin. You’re the CIO of a state. Your charter is to secure, as fully as possible, all data and services used at the state level and to advise a variety of agencies and groups at the local lev...
How Remediation Improves Readiness for SEC Cybersecurity Rule Disclosures
Blog Published: 01/26/2024
Originally published by Dazz. Written by Noah Simon, Head of Product Marketing, Dazz. With the new SEC disclosures rule for material cybersecurity incidents now in effect, much of the talk on SEC rules is centered around materiality. Material incidents now need to be disclosed in just four day...
12 Months, 5 Lessons and 1 Forecast: Decoding Cybersecurity Trends in GenAI’s Inaugural Year
Blog Published: 01/19/2024
Written by Amit Mishra, Global Head, Data Security and Data Privacy Practice, Cybersecurity, HCLTech.GenAI was just launched. An unsuspecting employee in a large corporation decided to put this to good use. He shared the blueprint in the AI prompt. We can only speculate that he was trying to r...
CISO’s Checklist: How to Train Employees to be SaaS Cyber Aware
Blog Published: 01/23/2024
Originally published by AppOmni.Written by Tamara Bailey, Content Marketing Specialist, AppOmni. While no employee sets out to harm their company, end-user behaviors flaws are, by far, the primary cause behind SaaS data breaches and security incidents.This checklist will walk you through pract...
Clarifying 10 Cybersecurity Terms
Blog Published: 01/19/2024
The many facets of cloud and cybersecurity work together to create a holistic security posture. It’s rare to find an organization that has the skills and resources to devote the ideal amount of attention and energy to every area of cybersecurity, but being able to define some basic policies an...
State of Zero Trust Across Industries
Blog Published: 01/22/2024
Written by Christopher Niggel, Regional CSO, Americas at Okta. As we begin a new year, we reflect on the progress we’ve made over the past year, and our Zero Trust journeys are no different. In this installment of the Zero In column, we look at benchmarks from Okta’s latest State of Zero Trust...
What is the Shared Responsibility Model in the Cloud?
Blog Published: 01/25/2024
In cloud computing, understanding the shared responsibility model is crucial. As the name implies, the shared responsibility model delineates who is responsible for what in regards to a cloud environment. This responsibility matrix varies depending on the cloud provider, service model, and dep...
Empowering Security: Security Orchestration and Automated Response to Help Secure the Future
Blog Published: 01/29/2024
Originally published by KPMG. Global businesses face a paradigm shift demanding revolutionary new capabilities to detect and respond to today’s fast-expanding cyber threat landscape. As emerging technologies such as artificial intelligence (AI) and automation redefine cyber threat detection an...