Enhance security posture: 4 key approaches to manage vulnerabilities

Enhance security posture: 4 key approaches to manage vulnerabilities

Cloud native application development is surging across businesses, along with the adoption of public cloud infrastructure and services. This progress has led to a growing set of challenges for security: as organizations expand their use of cloud native technologies, the complexity of these environments continues to grow, significantly increasing the attack surface. This added risk has not stopped the adoption but is making scaling and maintenance increasingly difficult, especially as teams have been moving more…

Read More

Cybersecurity risks organizations need to address this year

Cybersecurity risks organizations need to address this year

As organizations navigate a new year, they face a fundamental truth: traditional perimeter-based security has failed. The modern enterprise isn’t defined by its devices and users but by its digital assets — the crown jewels that power operations and drive value. Yet most security approaches remain stuck in an outdated paradigm, focusing on protecting devices and user accounts while overlooking the dynamic web of service accounts, APIs and machine identities that actually access and manage…

Read More

Vulnerability management simplified: The core essentials

Vulnerability management simplified: The core essentials

In light of today’s evolving threat landscape and high-profile cybersecurity breaches, organizations are facing growing pressure to strengthen their security foundations. These incidents highlight the urgent need for proactive strategies to address vulnerabilities in applications, infrastructure and data. CISOs and security teams can take action now to prepare for potential threats, focusing on a few essential priorities.  Strengthening foundational security measures to reduce exposure and improve resilience It all starts with assets. What are you…

Read More

8 vulnerabilities found in macOS operating system Microsoft apps

8 vulnerabilities found in macOS operating system Microsoft apps

Researchers from Cisco Talos have discovered 8 vulnerabilities in macOS operating system Microsoft apps. Through these vulnerabilities, a malicious actor can bypass an operating system’s permission model via existing permissions without requiring additional verification from the user. Successful attacks could grant a malicious actor any privilege already gained in the targeted application, such as sending emails, recording video and audio, or capturing pictures. According to the research, Microsoft considers these vulnerabilities to be a low…

Read More

AI arms race: Cybersecurity defenders in the age of evolving threats

AI arms race: Cybersecurity defenders in the age of evolving threats

As web application cyberattacks surge, defenders are on the frontline of an ever-evolving battlefield. With adversaries leveraging artificial intelligence (AI) to sharpen their assaults, defenders face unprecedented challenges. However, AI isn’t just empowering attackers — it’s also emerging as a crucial ally for defenders. Organizations can use AI’s capabilities and implement strong security training to identify and neutralize threats.  Rest assured, the rise in web application attacks signifies a persistent shift rather than a passing…

Read More

Security leaders are facing a new wave of identity risks

Security leaders are facing a new wave of identity risks

A study has found that increased technological and organizational complexity is contributing to new identity risks that security leaders must manage. The study, done by ConductorOne, surveyed more than 500 IT security leaders in the United States and found that increased complexity is driving new identity risks.  On the subject of technology complexity, the report found that hybrid IT environments are common. 76% of respondents reported that their company has a hybrid IT environment. 18%…

Read More

Misconfigurations drive 80% of security exposures

Misconfigurations drive 80% of security exposures

A report from XM Cyber analyzes more than 40 million exposures in order to provide a thorough understanding of the current exposure landscape. The report found that 80% of exposures are caused by identity and credential misconfigurations. Out of these exposures, one-third of them put critical assets at risk of a breach. According to the report, a majority of the exposure is within an organization’s active directory, a critical component for connecting users to network…

Read More

3 tips to help bridge the gap between identity and security teams

3 tips to help bridge the gap between identity and security teams

Every year, we see the lines continue to blur between IT, operations and security teams, with many functions traditionally sitting with the CIO that may be better suited with the CISO — or at least need a dotted line to the security team. One such function is identity. Identity and Access Management traditionally manages access to systems, databases, devices, the cloud, SASS applications, remote access, multi-factor authentication (MFA) and account privileges rather than focusing on…

Read More

False positives: Mitigating concerns from cybersecurity-minded users

False positives: Mitigating concerns from cybersecurity-minded users

Author’s note: Views are my own. Enterprise organizations may require that their product adhere to strict security requirements or undergo extensive vendor due diligence at onboarding. Technical analysis of the product, code or software via scanning or testing is often a step in this process. While a security assessment is a crucial component of any vendor management program, security assessments of a product can sometimes indicate risk when there is no risk. A typical example…

Read More

Unveiling the power of external attack surface management

Unveiling the power of external attack surface management

Verizon’s latest data breach report shows that 83% of attacks are carried out by external actors, exploiting vulnerabilities in companies’ network perimeters. At the same time, Gartner has identified External Attack Surface Management (EASM) as the top cybersecurity trend for the coming 5 to 10 years. So, what exactly is EASM, and why is it gaining such global prominence?  EASM is a cybersecurity approach that involves continuously monitoring and assessing a company’s publicly accessible digital assets for vulnerabilities….

Read More
1 2