A 3rd party supplier is asking us to install their VPN client onto our corporate machines to enable access to their environment, is this a good idea?

As per the question what are the risks?
if we did go ahead with this and some of our users installed a supplier’s VPN client on to our corporate machines, once the connection is establish can a threat actor from the supplier use that conne… Continue reading A 3rd party supplier is asking us to install their VPN client onto our corporate machines to enable access to their environment, is this a good idea?

How One Application Test Uncovered an Unexpected Opening in an Enterprise Call Tool

Working as security consultants is highly rewarding. Companies depend on us to view their environment from the perspective of an attacker and find vulnerabilities that could enable threats to succeed. One of the most impactful parts of our role is when we’re the first to find a major vulnerability that could lead to a widespread […]

The post How One Application Test Uncovered an Unexpected Opening in an Enterprise Call Tool appeared first on Security Intelligence.

Continue reading How One Application Test Uncovered an Unexpected Opening in an Enterprise Call Tool

What are the risks we can foresee when our database having outbound connection to internet through port 25? [closed]

I was reviewing our existing architecture of the application and found that the database virtual machine opened port 25 for communicating with email server in the internet.

What are risks? I want to do a risk assessment of this vulnerabi… Continue reading What are the risks we can foresee when our database having outbound connection to internet through port 25? [closed]

2021 Cybersecurity: Mitigating Mobile Security Risks for CISOs

Cybersecurity has always been a significant challenge for businesses, mostly due to the increasing financial and reputational cost of data breaches. As a result, there has been a consistent rise in tactics and technologies used to combat these threats…. Continue reading 2021 Cybersecurity: Mitigating Mobile Security Risks for CISOs

Forter raises $300M on a $3B valuation to combat e-commerce fraud

E-commerce is on the rise, but that also means the risk, and occurrence, of e-commerce fraud is, too. Now, Forter, one of the startups building a business to tackle that malicious activity, has closed $300 million in funding — a sign both of the size of the issue, and its success in tackling it to […] Continue reading Forter raises $300M on a $3B valuation to combat e-commerce fraud

Forter raises $300M on a $3B valuation to combat e-commerce fraud

E-commerce is on the rise, but that also means the risk, and occurrence, of e-commerce fraud is, too. Now, Forter, one of the startups building a business to tackle that malicious activity, has closed $300 million in funding — a sign both of the size of the issue, and its success in tackling it to […] Continue reading Forter raises $300M on a $3B valuation to combat e-commerce fraud

How to Reduce Zero Trust Frustration By Capturing Context

Zero trust remains one of the best ways for companies to reduce total risk. By knowing the potential risk of any request — both inside and outside the enterprise network — rather than assuming good intentions, companies can limit potential attacks. Deploying a zero trust framework at scale, however, may cause frustration. It increases operational […]

The post How to Reduce Zero Trust Frustration By Capturing Context appeared first on Security Intelligence.

Continue reading How to Reduce Zero Trust Frustration By Capturing Context