Securing Data Beyond The Corporate Walls

Despite the massive international push for cloud adoption, a distressing number of corporations have not deployed the proper means to securing critical data. Traditional firewalls may have sufficed in the traditional on-prem setting, but with business… Continue reading Securing Data Beyond The Corporate Walls

Cybersecurity is About Teamwork, Not Individuals

More and more, businesses blame cyberattacks on “human error,” that single employee who, either accidentally or maliciously, made a decision that resulted in a security breach. You probably remember the 2017 Equifax breach that exposed over… Continue reading Cybersecurity is About Teamwork, Not Individuals

NordVPN Breached

There was a successful attack against NordVPN: Based on the command log, another of the leaked secret keys appeared to secure a private certificate authority that NordVPN used to issue digital certificates. Those certificates might be issued for other servers in NordVPN’s network or for a variety of other sensitive purposes. The name of the third certificate suggested it could… Continue reading NordVPN Breached

NordVPN Breached

There was a successful attack against NordVPN: Based on the command log, another of the leaked secret keys appeared to secure a private certificate authority that NordVPN used to issue digital certificates. Those certificates might be issued for other … Continue reading NordVPN Breached

Bitglass Security Spotlight: 20 Million Russian Citizens Exposed

Here are the top stories of recent weeks:  

20 Million Russian Citizens Exposed
One Billion WhatsApp Users Can Lose Personal Data Via GIFs
More Than 500 U.S. Schools Have Been Affected by Ransomware Thus Far in 2019
Déjà vu! Googl… Continue reading Bitglass Security Spotlight: 20 Million Russian Citizens Exposed

The Four Pillars of CASB: Visibility

Due to the overwhelming amount of data exfiltration, auxiliary CASBs (cloud access security brokers) primarily focus on shadow IT discovery. While blocking unsanctioned apps sounds like the right approach, employees not having some of the tools they’r… Continue reading The Four Pillars of CASB: Visibility

Bitglass Security Spotlight: A Step-By-Step Guide To Breach Instagram

Here are the top stories of recent weeks:  

Hacker Demonstrates his Step-By-Step Process to Breach Instagram’s Login Module
Uber Security Flaw Enables Threat Actors to Hitch a Ride, at Your Expense
Cyber Criminals Have Been Targeting … Continue reading Bitglass Security Spotlight: A Step-By-Step Guide To Breach Instagram

Cyber Security Threats – Paul Claxton – ESW #156

Cyber Security Threats
The post Cyber Security Threats – Paul Claxton – ESW #156 appeared first on Security Weekly. Continue reading Cyber Security Threats – Paul Claxton – ESW #156

SOC Visibility and SIEM Tools – Jeff Costlow – BSW #145

SOC Visibility and SIEM Tools
The post SOC Visibility and SIEM Tools – Jeff Costlow – BSW #145 appeared first on Security Weekly. Continue reading SOC Visibility and SIEM Tools – Jeff Costlow – BSW #145

The Cloudfathers: The Latest Cybersecurity Findings For Fortune 500

As areas of cloud computing, social media, e-commerce, artificial intelligence (AI), machine learning, and infrastructure as a service (IaaS) are being explored and developed, the potential growth for leading tech organizations remains strong.
 
Continue reading The Cloudfathers: The Latest Cybersecurity Findings For Fortune 500