Balancing trust and safety: Lessons from the CrowdStrike incident

Balancing trust and safety: Lessons from the CrowdStrike incident

On July 19, CrowdStrike, one of the largest endpoint security providers, issued an update to Windows servers globally that caused them to enter a “crash loop,” resulting in the infamous Blue Screen of Death (BSOD). CrowdStrike explained the issue was caused by a “defect found in a single content update for Windows hosts.” The downstream impact of this bug resulted in one of the largest and broadest outages in history. When situations like this occur,…

Read More

The bad actor’s best friend: Dormant service accounts

The bad actor’s best friend: Dormant service accounts

Dormant accounts, also known as inactive accounts, are accounts that haven’t been used or updated in at least 90 days. This extended period of inactivity gives them their “dormant” classification.  Since these accounts are not being actively used, it’s common for application owners not to know they exist. The lack of knowledge can be attributed to the fact that these accounts aren’t being accessed or updated, meaning they don’t appear in system logs or trigger…

Read More

New honeypot techniques for addressing targeted attacks

New honeypot techniques for addressing targeted attacks

Automated at-scale attack campaigns now represent the vast majority of online threats, and are starting to blend together with targeted attacks. As the number of these attacks increases, so does the cyber risk for organizations.   Unfortunately, the most common approaches to defense — including vulnerability management, phishing awareness, signature-based network and endpoint detection — are neither effective nor efficient in addressing these kinds of attacks because traditional third-party threat intelligence cannot provide adequate targeted…

Read More

Embrace the data sprawl, securely

Embrace the data sprawl, securely

Data is the lifeblood of every enterprise, so why does the task of managing and securing rapidly expanding volumes and types of data and new, modern threats continue to be a formidable challenge for most organizations? According to the Identity Theft Resource Center (ITRC), 2023 set a new record for data breaches, with data compromises jumping 78% over 2022. Malicious actors obviously see the value of data — but without visibility and controls into where…

Read More

The power of partnership in mitigating cyber risk: A CFO’s perspective

The power of partnership in mitigating cyber risk: A CFO’s perspective

Business leaders are charged with creating economic value. Escalating cybercrimes, however, pose critical threats to growth. Indeed, bad actors are increasingly creative and sophisticated with their craft. Viruses, worms, trojans, spyware, bricking, other malware, whaling, other forms of phishing, crypto-jacking, man-in-the-middle attacks, zero-day exploits or a good old fashioned brute force attack are just a few ways these bad actors can impinge on our ability to effectively run a business. And for unsuspecting companies, especially…

Read More

Empowering remote healthcare workers: A collaborative approach

Empowering remote healthcare workers: A collaborative approach

Healthcare organizations are increasingly adopting remote work as a permanent strategy. In this new era, robust cybersecurity is critical. This article delves into strategies healthcare organizations can implement to empower their remote workforce and protect sensitive patient and corporate data. Understanding shared security responsibility With remote employees now relying on IT resources beyond the control of healthcare organizations, the concept of shared security responsibility becomes paramount. It’s not just about organizations securing as much of…

Read More

A CISO's perspective on the modern cybersecurity landscape

A CISO's perspective on the modern cybersecurity landscape

Many businesses still believe there is such a thing as 100% security, despite every cybersecurity expert affirming the opposite. Because companies push for and demand 100% security, the organization ultimately settles for a false sense of it so their people can function. Such a mindset is not only wrong but incredibly dangerous. Business leaders must recognize that breaches are imminent, and a robust approach to cybersecurity involves detecting and responding quickly and effectively to incidents….

Read More

Nearly 90% of businesses saw up to 9% of revenue lost due to fraud

Nearly 90% of businesses saw up to 9% of revenue lost due to fraud

A new survey by Veriff has shown that fraud attempts have increased this year, contributing to financial repercussions. Almost 90% of respondents report that their organization saw as much at 9% of revenue lost as a result of fraud. This suggests that companies making $100 million per year could potentially lose $9 million annually from fraud.  Key findings from the survey include:  Nearly 87% report a rise in online fraud as of April 2024. Only 1.19%…

Read More

Beyond the breach: The ongoing fragility of healthcare cybersecurity

Beyond the breach: The ongoing fragility of healthcare cybersecurity

A wave of ransomware attacks in the United States and United Kingdom that have disrupted clinical operations and forced hospitals in both regions to turn away patients is the latest reminder of the fragility of life-saving infrastructure and how lucrative it can be for attackers looking for a payday or an opportunity to sow discord into the lives of patients.  In May, St. Louis-based Ascension Healthcare, one of the largest private healthcare systems in the…

Read More

Cybercriminals target SAP vulnerabilities

Cybercriminals target SAP vulnerabilities

Cybercriminals are getting better at attacking critical business applications, according to a recent report by Onapsis. The report found a rise in threat actors targeting SAP vulnerabilities.  According to the report, 2023 was an important year for the SAP application threat landscape. The report found a 400% increase in ransomware incidents that involved compromising SAP systems and data at victim’s organizations.  The report found that conversations on SAP vulnerabilities and exploits have increased 490% across…

Read More
1 2 3 4 5 6