3 Shifts in the Cyber Threat Landscape

3 Shifts in the Cyber Threat Landscape

Around the world, 2022 was a year of instability and conflict which added to the daily challenges faced by cybersecurity professionals. But they weren’t the only ones feeling the strain. Bad actors were also forced to adapt, trying to maintain “business as usual” by exploring new infiltration methods and by targeting more lucrative victims. Even if 2023 proves to be more predictable than last year, the cyber threat landscape is already undergoing big changes. To…

Read More

Best Practices for Secure Remote Development

Best Practices for Secure Remote Development

Remote work and work from home have become commonplace in software development. When done properly, it allows software teams to collaborate from anywhere, which can potentially reduce company overhead, boost productivity, and aid recruitment. But without the right security measures in place, developing from home can increase an organization’s exposure to security breaches. Some of the common risks that a developer might face when working from home include: Malware: any software created with hostile intentions,…

Read More

Bay Area Bank Collapse and the Cybersecurity Impact

Bay Area Bank Collapse and the Cybersecurity Impact

Expect Phishing Scams Like the click-bait-ish title I gave to this blog, recent news events are almost always used as part of phishing attacks. As other banks have experience difficulties, expect phishing scams to include mentions of recent bank failures. This makes for a good topic to phish for online banking credentials. Look out for lines like: “This is the FDIC, and you must claim your $225k deposit insurance within 24 hours,” or “This is…

Read More

Cloud Migration Security

Cloud Migration Security

Cloud Migration Security Workload Security Cloud migration is a journey, not a destination. Learn the basics of security for making the (gradual) switch, so you can get the most out of what the cloud has to offer. By: Andrew Stevens March 28, 2023 Read time:  ( words) Think of cloud migration like moving away from your childhood home. On the outset, leaving behind the familiar is difficult, but when you remind yourself about the dream…

Read More

4 Tips for Better AWS Cloud Workload Security

4 Tips for Better AWS Cloud Workload Security

There are a few key criteria that we need to consider and include in our cloud architectures to better protect our workloads in the AWS cloud. Vulnerability detection and prevention Protect against threats and ransomware Ability to send security events generated from different sources to a centralized platform in a simplified framework. Misconfigurations and lack of visibility for our cloud resources But odds are we have a few, to ensure the security of our workloads,…

Read More

Prevent Ransomware with Cybersecurity Monitoring

Prevent Ransomware with Cybersecurity Monitoring

Ransomware and other cyberattacks routinely take advantage of misconfigurations in cloud and IT systems and accounts. Tools that enable continuous, automated cybersecurity monitoring help close those gaps and strengthen overall attack surface risk management Continue reading the Ransomware Spotlight series:Ransomware Recovery Plan for 2023Fight Ransomware with a Cybersecurity AuditSecurity Patch Management Strengthens Ransomware Defense With authorities cracking down on cybercriminals, organizations refusing to pay cyber ransoms, and media stories touting ransomware’s decline, it could seem…

Read More

How Your Cybersecurity Strategy Enables Better Business

How Your Cybersecurity Strategy Enables Better Business

Historically, cybersecurity has the reputation of getting in the way of doing business. Few people are happy when required to change a password, or when told a proposed new application needs additional safeguards before it can be deployed. A recent Trend Micro global survey, Risk and Reward, found that 84% of respondents say cyber policies are impacting employees’ ability to do jobs in office; business being slower, difficulty accessing info, and general access to the…

Read More

Policy as Code vs Compliance as Code

Policy as Code vs Compliance as Code

Developments in automation and orchestration of IT systems have been steadily changing in the past decade. There has been a shift from manual to automated management across several dimensions—including server configuration, networking, and even business processes. One key area where automation is playing an increasingly important role is compliance. When it comes to policy and compliance, automation comes in the form of policy as code and compliance as code. What is policy as code? Policy…

Read More

3 Ways to Evolve Your Cybersecurity Operations

3 Ways to Evolve Your Cybersecurity Operations

What SOC teams need most are better ways to correlate and prioritize alerts so they can isolate the ones that truly matter while getting in front of threats instead of reacting to them. They also need to streamline their toolsets so they can manage more effectively. As a result, optimizing XDR, assessing risk continuously and shifting away from point solutions are critical. Step 1: Optimize XDR for stronger cybersecurity operations Most cybersecurity operations teams rely…

Read More

Establishing a Proactive Cybersecurity Plan

Establishing a Proactive Cybersecurity Plan

A recent survey with Sapio Research has revealed that 73% of respondents were concerned about the size of their digital attack surface. This overwhelming reaction to the current state of cyber threats affecting organizations is based upon a single fact: remote work. Due to expansions in WFA (work-from-anywhere) labor forces and organizational cloud services, the reality of being exposed to a cyberattack has migrated from “if” to “when.” This has ushered in a need for…

Read More
1 2 3 4 17