Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

September 2022

netacea

Addressing the Cybersecurity Skills Shortage

In 2021, there were an estimated 4.19 million cybersecurity professionals in the workforce — an increase of more than 700,000 since 2020. This welcome growth suggests businesses are now taking online threats more seriously than ever. But while the cybersecurity workforce is growing, it’s still a long way from where it should be. Skills shortages in cybersecurity are currently the highest on record.

idcentral

Everything about the Online Skill Based Gaming Laws in India

According to a recent government assessment, India needs a regulatory body to oversee and categorise online gambling websites. The study, which was created by a committee of senior officials under Prime Minister Narendra Modi, advocated for involvement and tougher categorization of India’s online gaming industry.

redscan

Kroll CFO report reveals high cost of business overconfidence around cyber risk

Our new CFO cybersecurity survey, which surveyed 180 CFOs, CEOs and other financial executives worldwide, has highlighted the fact that Chief Financial Officers are very confident in their companies’ abilities to ward off cyber security incidents, despite being underinformed on the cyber risk their businesses face. Almost 87% of the surveyed executives expressed this confidence, yet 61% of them had suffered at least three significant cyber incidents in the previous 18 months.

Cloud Insecurities - How to threat hunt in hybrid and multi cloud environments

Amidst a record number of workloads moving to the cloud – security teams must not only confront the cyber-skills shortage, but also a general lack of cloud expertise. Corelight and guest Forrester will share best practices for building threat detection, hunting, and incident response capabilities to the cloud and upskilling your existing SecOps team. Watch this on demand webcast to learn.
netskope

The EU Cyber Resilience Act - Thinking Out Implementation

From TVs to watches, fridges, lightbulbs, or coffee machines, it seems everything needs to be connected now to be marketable. The Internet of Things (IoT) environment is growing in homes and workplaces, but it has established itself way ahead of regulation. IoT devices do not currently have to comply with any specific cybersecurity standards and malicious actors are already making use of these endpoints.

tripwire

Your Guide to the Latest Email Fraud and Identity Deception Trends

There’s a high chance that you or someone you know has been impacted by email fraud or identity theft. At the very least, you’ve likely received a variety of spam emails and text messages asking to provide a payment or confirm your identity. The good news is that cybersecurity protection is constantly evolving and improving, with cybersecurity education programs preparing skilled professionals to enter the front lines against cybercrime.

nightfall

How To Create A Cloud Security Policy [+ FREE Template]

By one estimate, 60% of all corporate data is stored in the cloud. Businesses rely on cloud platforms like Slack, Google Drive, GitHub and Confluence to store data, share information, and run smoothly. Unfortunately, hosting all this information in one place provides an appealing target for hackers. Cloud programs are often vulnerable to data hacks, leaks, and insider threats.

egnyte

How the Parkinson's Foundation Stays Secure With a Small IT Staff

At the Parkinson’s Foundation, we believe data security is a team sport, which is why we rely on everybody in our organization to follow best practices for protecting our content. Like most organizations, we have several layers of sensitive content, including some of our accounting and marketing files.

teleport

What Are JWTs?

JSON web tokens (JWTs) are an open standard for securely transmitting data as a JSON object between parties in a compact and self-contained format. Knowledge of JWTs is important because most modern systems and tools use them for secure, efficient and scalable authorization. Knowing about JWTs will also help you understand how third-party integrations with other software work.