Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

September 2022

The 4-step plan to fortify your organization against cybersecurity threats

In today's technologically driven environment, security breaches are inevitable and cyber threats are plentiful. A fail-proof cybersecurity strategy has thus become the need of the hour. But how do you strategize a plan that accounts for this growing variety of threat actors? Join us for an insightful webinar where we'll build an effective cybersecurity strategy.

Uber data breach 2022: How the hacker annoyed his way into the network (and our learnings)

Illustration by jcomp On Sept. 15, Uber Technologies Inc. was breached by an 18-year-old. The hacker purchased an employee’s stolen credentials from the dark web and pushed a flood of multi-factor authentication (MFA) requests and fake IT messages to them in hopes of getting into their account. Irritated by the non-stop pop-ups, the employee caved in and approved the request, unwittingly setting off a cyberattack.

Securing data through the compliance lens

As globalization takes shape and government regulations defy borders, the issue of compliance risk remains a top-level business issue. Growing concerns over consumer privacy and data security have prompted a rush of legislation intended at holding corporations more accountable for maintaining and sharing the information they collect about consumers.