How organizations can maintain a third-party risk management program from day one

In this podcast recorded at RSA Conference 2020, Sean Cronin, CEO of ProcessUnity, talks about the importance of third-party risk management and how companies can get started with a proven process that works. Here’s a transcript of the podcast for your… Continue reading How organizations can maintain a third-party risk management program from day one

Microsoft releases patch for leaked SMBv3 RCE flaw

After the inadvertent leaking of details about a wormable Windows SMBv3 RCE flaw (CVE-2020-0796) on Tuesday, Microsoft has rushed to release a patch (i.e., security updates). The flaw affects Windows 10 (versions 1903 and 1909) and Windows Server (1903… Continue reading Microsoft releases patch for leaked SMBv3 RCE flaw

(IN)SECURE Magazine: RSAC 2020 special issue released

RSA Conference, the world’s leading information security conference and exposition, concluded its 29th annual event in San Francisco. More than 36,000 attendees, 704 speakers and 658 exhibitors gathered at the Moscone Center to explore the Human Elemen… Continue reading (IN)SECURE Magazine: RSAC 2020 special issue released

Coronavirus as an opportunity to evolve security architecture

Fear of coronavirus infections has resulted in organizations ruling out large meetings. Healthy individuals are in home-quarantine for weeks at a time, even though they are not necessarily thought to carry the virus. This large number of individuals co… Continue reading Coronavirus as an opportunity to evolve security architecture

Cybercriminals leveraging coronavirus outbreak to execute ransomware attacks

Cybercriminals are likely to leverage the global anxiety around the coronavirus outbreak to execute ransomware attacks against businesses, according to RiskIQ. After extensive analysis of past ransomware attacks during global epidemics and current phis… Continue reading Cybercriminals leveraging coronavirus outbreak to execute ransomware attacks

DNS over HTTPS misuse or abuse: How to stay secure

Firefox and Chrome have recently begun supporting external DNS resolvers in the cloud. The use of these DNS services bypasses controls that enterprise IT organizations put in place to prevent end users from visiting unauthorized Internet destinations. … Continue reading DNS over HTTPS misuse or abuse: How to stay secure

Why a risk-based approach to application security can bolster your defenses

Like it or not, cybercrime is big business these days. A casual glance at the news at any given time will typically reveal several new breaches, usually involving eye-watering amounts of personal or sensitive information stolen. As such, any executive … Continue reading Why a risk-based approach to application security can bolster your defenses

What is open threat intelligence and what is driving it?

In this podcast recorded at RSA Conference 2020, Todd Weller, Chief Strategy Officer at Bandura Cyber, discusses the modern threat intelligence landscape and the company’s platform. The Bandura Cyber Threat Intelligence Protection Platform: Aggre… Continue reading What is open threat intelligence and what is driving it?

Maximizing customer engagement when fraud prevention is top of mind

With the number of data records breached in 2019 surpassing four billion, fraud prevention and regulatory compliance are, inevitably, top priorities for financial institutions (FIs). A recent report from Javelin, for example, found that FIs are signifi… Continue reading Maximizing customer engagement when fraud prevention is top of mind

Europe’s Gaia-X cloud service faces a difficult future

In January, Microsoft reported its fiscal 2020 second quarter results. Among the company’s many impressive accomplishments is a 62% growth (yeay-over-year) of its Azure cloud service. This secures the company’s spot as a dominant player in the cloud sp… Continue reading Europe’s Gaia-X cloud service faces a difficult future