Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Risk Management

SLP Denial of Service Amplification - Attacks are ongoing and rising

The Service Location Protocol (SLP), as defined in the RFCs, is vulnerable to abuse allowing attackers to use it as a powerful reflective denial-of-service amplification vector. Earlier this year, Bitsight and Curesec published a joint research regarding this flaw tracked as CVE-2023-29552, which details the issue as well as its global impact and exposure.

The Rise of Automotive Hacking

The automotive industry stands at the crossroads of innovation and vulnerability. As cars become increasingly connected, with advanced systems and features that rely on intricate software, the rise of automotive hacking has become a pressing concern. The convergence of traditional mechanical engineering and cutting-edge software has given rise to a new breed of threats that extend beyond physical security, delving into the digital realm of vehicle control systems.

How automation can ensure compliance and safety for businesses?

In today’s complicated, highly interdependent business environment, assuring business security is not just a regulatory requirement. It’s also a vital component of a successful business strategy. Automation becomes crucial in such a world, offering innovative solutions that streamline operations, mitigate risks, enhance overall safety, and provide peace of mind.

CISO Roles and Responsibilities (and Job Description Template)

It’s well known by now that cyber attacks and successful breaches have exploded in recent years. Accenture’s latest report on the state of cybersecurity notes that companies experience an average of 270 attacks per year. And Gartner warns that nearly half of organizations worldwide will experience an attack on their digital supply chains.

Securing Your Supply Chain: Risk Management vs Security Management

Supply chain management has become a top priority for businesses due to the increasing use of digital technologies and geopolitical uncertainties, making global supply chains more vulnerable than ever to disruptions. This reality highlights two critical aspects of supply chain management: Supply Chain Risk Management (SCRM) and Supply Chain Security Management (SCSM).

Understanding Software Licensing Agreements

The great Yogi Berra is often quoted as having said "in theory, there is no difference between practice and theory. In practice, there is." Perhaps the same can be said about software licensing agreements. There are often two dimensions to any software license agreement: what’s in the agreement and how the commercial relationship is implemented in practice.

Global Cyber Threats: Insights and Strategies for Defense

In an era where digital connectivity spans across borders, understanding and countering global cyber threats has become a paramount concern for businesses, governments, and individuals alike. This blog post delves into the prevailing global cyber threat trends and outlines effective strategies to defend against these evolving challenges.

Strengthening the Shield

The role of governments has evolved to include the safeguarding of not just physical borders but also virtual territories. With an increasing reliance on technology, the need for robust cybersecurity measures within government entities has never been more critical. Here we’ll explore cybersecurity best practices that can fortify government systems, ensuring the protection of sensitive information and the preservation of national security.

Security Ratings as a Vehicle for Communication

There’s never going to be a silver bullet that makes a CISO’s job easy, but I believe that with the right people, tools, metrics, and KPIs, the job can become easier. My fellow security leaders—the CISO mafia, if you will—have expressed frustration in the past when it comes to Security Ratings. Their view has been that an external rating was not done with any cooperation or internal view of their security environment.