cyber
Cyber Resilience Lacking, Organizations Overconfident
There are significant gaps in cyber resilience, despite growing confidence in organizational strategies, according to a Cohesity survey of 3,100 IT and security decision-makers across eight countries ...
Security Boulevard
Risk and Reward of APIs and Third-Party Connectors in the Cloud
Risk and Reward of APIs and Third-Party Connectors in the Cloud7 min read·Just now--A Security Operations (#SecOps) and Engineering Commentary from industry insider Rohan Bafna , SecOps Engineer.Third-party connectors through an Application ...
Phishing Threat Actor Leverages AI to Target Multiple Crypto Brands
A crypto phishing campaign has been identified in which a threat actor employs AI-generated content to create 17,000 phishing lure sites impersonating more than 30 major cryptocurrency brands, including Coinbase, Crypto.com, Metamask ...
Security Boulevard
IoT Security Means Remediation Not Mitigation
A topic that I recently got asked about was vulnerability mitigation for IoT systems, which shows that even within the security community there is still a belief that mitigation equals threat resolution. ...
RSAC 2024 Day 2: IoT Security Questions (and Answers)
RSA Conference delivers in terms of interesting dialogues with other cybersecurity professionals, and this year while there is not much on the conference agenda related to IoT security there is a lot ...
RSAC 2024: IoT Security Questions (and Answers)
The 2024 RSA Conference is underway, and Viakoo is out in force. During the conference as we meet with customers, prospects, media, and analysts I will try to cherry pick some of ...
Urgency on Password Management
As a security professional I’d like you to consider the following scenario. You’re constantly adding new laptops to your organization, devices that connect to your corporate networks and will hold and transit ...
Unsafelok Threat Highlights It’s About Both IoT Devices and Applications
IoT devices and applications exist all over the place, and in high volume. Today’s news brought yet another example of how the scale of IoT systems leads to the conclusion that their ...
A Cyber Insurance Backstop
In the first week of January, the pharmaceutical giant Merck quietly settled its years-long lawsuit over whether or not its property and casualty insurers would cover a $700 million claim filed after ...
Survey on 2024 IoT Security Crisis
Surveys play an important role in setting strategy and choosing how to address a difficult situation. Organizations today are urgently in need of addressing their IoT security situation; it’s the fastest growing ...