Cybersecurity Insights with Contrast CISO David Lindner | 7/26/24

Cybersecurity Insights with Contrast CISO David Lindner | 7/26/24

Insight #1 A North Korean hacker, using a deep-faked identity, was hired by the U.S. cybersecurity firm KnowBe4. Shortly after receiving his workstation, the hacker used a virtual private network (VPN) and Raspberry Pi ...
SANS Johnson Controls Trojan Smart Home Leaks Lead to Cyberattacks

SANS Institute Survey Surfaces State of Cybersecurity Defenses

A SANS Institute survey found most orgs felt they had the right policies, processes and controls defined, but only 67% had metrics to prove it ...
Security Boulevard
Check, Please! Adding up the Costs of a Financial Data Breach

Check, Please! Adding up the Costs of a Financial Data Breach

Guest article by Andrea Babbs, UK General Manager at VIPREReliance on email as a fundamental function of business communication has been in place for some time. But as remote working has become ...
CISOs, least privilege, cybersecurity, challenges, risks,

Styra Adds Declarative Tool to Generate Authorization Policies

Styra this week launched a declarative tool that enables cybersecurity teams to generate authorization policies that can be implemented programmatically by a DevOps team. Company CEO Bill Mann said Rego Policy Builder ...
Security Boulevard

DevSecOps Delivered: Automated GitHub Pull Requests

In this episode of DevSecOps Delivered, we demonstrate how to use the Github automated pull requests integration in Nexus Lifecycle. You'll learn: How the Jenkins integration works How source control management (SCM) ...
IP Reputation Scores: Additional Security for SMBs

IP Reputation Scores: Additional Security for SMBs

Cybercriminals continue to find new ways toto deliver malware, DDoS and other attacks. These attacks can have substantial consequences for businesses and their stolen customer data. But what can small businesses and ...

How to Prevent Insider Data Breaches at your Business

Guest article by Dan Baker of SecureTeamMajority of security systems are installed to try and forestall any external threats to a business’ network, but what about the security threats that are inside ...
Third Party Security Risks to Consider and Manage

Third Party Security Risks to Consider and Manage

Guest article by Josh Lefkowitz, CEO of Flashpoint Acceptable business risks must be managed, and none more so than those associated with external vendors who often have intimate access to infrastructure or ...
All I want for Christmas: A CISO's Wishlist!

All I want for Christmas: A CISO’s Wishlist!

As Christmas fast approaches, CISOs and cyber security experts around the world are busy putting plans in place for 2019 and reflecting on what could have been done differently this year. The ...
GDPR causes a flood of new policies

GDPR causes a flood of new policies

The upcoming GDPR deadline means you've probably seen an influx of changed policy announcements in your inbox. Here's why you might want to pay attention to the changes. Categories: Privacy Security world ...