breaches
How to Stay One Step Ahead of Data Breaches and Master Cloud Threat Detection
Implementing a cloud threat detection system enhances your team's ability to maintain a strong security posture without significant overhead ...
Security Boulevard
Unmasking the Sophisticated: How AI-Powered Defenses Thwart Advanced Phishing Attacks
Barry Strauss | | breaches, Cloud Email Security, credential harvesting, credential stealing, CTO Corner, Email Protection, generative AI, Phishing, Phishing Attacks, social engineering attacks, threat detection
Attackers are constantly refining their techniques for advanced phishing attacks to exploit the trust inherent in our digital systems. A recent incident we’ve captured highlights the alarming sophistication of modern phishing attempts, ...
Holding Trust for Ransom: What’s at Stake as Business Trust Erodes
Trust is vital to upholding the entire ecosystem in which all businesses operate, and the erosion of trust has considerable consequences for everyone. ...
Security Boulevard
Rubrik Allies With Mandiant to Increase Cyber Resiliency Capability
Rubrik at the Black Hat USA 2024 conference today revealed it is partnering with the Mandiant arm of Google to reduce the amount of time organizations require to recover from a cybersecurity ...
Security Boulevard
CISA Issues Warning: CrowdStrike Outage May Lead to Phishing and Malware Attacks
Stephen Kowski | | breaches, cisa, CrowdStrike, CTO Corner, General, Malware, malware attacks, Phishing, Phishing Attacks
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding the recent CrowdStrike outage, warning that malicious actors are actively exploiting the situation to conduct phishing and other cyber ...
The Urgency to Uplevel AppSec: Securing Your Organization’s Vulnerable Building Blocks
Let’s examine why so many applications remain vulnerable despite high-severity warnings and how to minimize the threat to your organization ...
Security Boulevard
How to Advance Breach Protection Against Non-Human Identity Threats in Workloads
2 min read Sticky note security now plagues application and service connections, necessitating a shift to more mature workload access safeguards. The post How to Advance Breach Protection Against Non-Human Identity Threats ...
The Team Sport of Cloud Security: Breaking Down the Rules of the Game
The best-case scenario for mitigating cloud security risks is when CSPs and customers are transparent and aligned on their responsibilities from the beginning ...
Security Boulevard
Credential and Secrets Theft: Insights from the 2024 Verizon Data Breach Report
4 min read Stolen identity data remains part of a large percentage of breaches, according to the annual landmark report. The post Credential and Secrets Theft: Insights from the 2024 Verizon Data ...
Former Uber CISO Appealing His Conviction
Joe Sullivan, Uber’s CEO during their 2016 data breach, is appealing his conviction. Prosecutors charged Sullivan, whom Uber hired as CISO after the 2014 breach, of withholding information about the 2016 incident ...