Comparing the Top 10 Leading CASBsWith the multitude of CASB vendors, there is a lot of noise, and it is not easy to evaluate the best...
Day: August 2, 2022
Campus has changed. Your building security strategy should too.
Campus has changed. Your building security strategy should too.There’s no denying that the meaning of “campus” or “workplace” has changed in every way possible. Now, studying...
The (Often Ignored) Fundamentals of Zero Trust
The (Often Ignored) Fundamentals of Zero Trust For all the grandiose terminology and technical challenges it poses, Zero Trust is a logical extension of cybersecurity concepts...
WordPress Password Protection – A Complete Guide
WordPress Password Protection – A Complete GuideWhat are the best methods of WordPress password protection for website administrators? This blog post examines the top password security...
Aspen Security Forum 2022 – Moderator: David Sanger, Panel: Jane Holl Lute’s And Matthew Olsen’s ‘Cyber, Domestic Terrorism And Spies Inside the System’
Aspen Security Forum 2022 – Moderator: David Sanger, Panel: Jane Holl Lute’s And Matthew Olsen’s ‘Cyber, Domestic Terrorism And Spies Inside the System’Jane Holl Lute, Former...
A Look Inside the LockBit Ransomware Gang
A Look Inside the LockBit Ransomware GangRansomware continues to be one of the biggest and most damaging types of cyberattacks today, as gangs are always evaluating...
What Is Open Source Intelligence: The Importance of OSINT in Your Organization’s Threat Landscape
What Is Open Source Intelligence: The Importance of OSINT in Your Organization’s Threat LandscapeOpen-source intelligence, or OSINT, refers to the process of gathering information from public,...
Why I’m Excited to be Helping Balbix
Why I’m Excited to be Helping BalbixCybersecurity risk is dynamic. A company’s exposure to it changes week by week, hour by hour. The bad guys are...
FAIL: Nomad DeFi Bridge ‘Loses’ $190M of Worthless Tokens
FAIL: Nomad DeFi Bridge ‘Loses’ $190M of Worthless Tokens Cryptocurrency startup Nomad claimed its “optimistic bridging” protocol would “would keep users’ funds safe.” We take a...
Cryptocoin “token swapper” Nomad loses $200 million in coding blunder
Cryptocoin “token swapper” Nomad loses $200 million in coding blunderTransactions were only approved, it seems, if they were initiated by... errrrr, by anyone.Leer másNaked SecurityTransactions were...
LockBit Ransomware Abuses Windows Defender to Deploy Cobalt Strike Payload
LockBit Ransomware Abuses Windows Defender to Deploy Cobalt Strike PayloadA threat actor associated with the LockBit 3.0 ransomware-as-a-service (RaaS) operation has been observed abusing the Windows...
What is ransomware and how can you defend your business from it?
What is ransomware and how can you defend your business from it?Ransomware is a kind of malware used by cybercriminals to stop users from accessing their...