Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

New State of Phishing Report 2023: An Alarming Surge in Phishing Threats

The fight against cyber threats remains a top priority for all organizations, including phishing attacks. SlashNext just released its much-anticipated annual "State of Phishing Report for 2023." This report sheds light on the alarming surge in phishing threats across email, web, and mobile channels. We will delve into the key findings and insights from the report, highlighting the growing influence of generative AI tools in cybercriminal activities. The Phishing Landscape: A Disturbing Uptick.

Move to the Cloud with Confidence: 6 Key Risks & Mitigation Techniques, Part 3

Cloud application, platform, and infrastructure vendors (cloud service providers, or CSPs) do a great job of advertising online. They offer seemingly painless ways to sign up for their services through “freemiums” and two-week trials, advertisements that follow you from Google to LinkedIn, and what appear to be straight-forward sales processes.

A10 Networks Simplifies Google Cloud Platform Cloud Deployments

A10 Networks has expanded its robust application delivery controller (ADC) solution to Google Cloud Platform (GCP), meeting the increasing demand for powerful and scalable application delivery in the cloud. Customers can now rapidly deploy A10 Thunder® ADC on GCP via the Google Cloud Marketplace.

The Importance of Securing Payroll Data: Best Practices for Small Businesses

In an era dominated by digital transactions and online operations, safeguarding payroll data has become a critical concern for businesses of all sizes. Delve into the significance of this task and learn about the methodologies small businesses can adopt to enhance their payroll data security.

Testing with OpenAPI Specifications

The 2023 SANS Survey on API Security (Jun-2023) found that less than 50 percent of respondents have API security testing tools in place. Even fewer (29 percent) have API discovery tools. Wallarm delivers both these capabilities via our single, integrated App and API Security platform. Wallarm has long offered the ability to generate OpenAPI Specifications (aka Swagger) based on actual traffic across your endpoints.

Trustwave Measures the Pros and Cons of President Biden's Executive Order to Regulate AI Development

President Joe Biden, on October 30, signed the first-ever Executive Order designed to regulate and formulate the safe, secure, and trustworthy development and use of artificial intelligence within the United States. Overall, Trustwave’s leadership commended the Executive Order, but raised several questions concerning the government’s ability to enforce the ruling and the impact it may have on AI’s development in the coming years.

CrowdStrike Achieves 100% Ransomware Protection Accuracy and 100% EDR Rating in SE Labs Test

Ransomware is a scourge that is on track to inflict over $30 billion in damages in 2023. Businesses and organizations that are hit by a ransomware attack face a potentially devastating data breach, with system downtime, recovery, negative publicity and the likelihood of a ransom payment to deal with. Many small businesses are unable to recover from the ordeal and end up permanently shutting their doors within months of being hit.

Webinar: Safeguard Your MSP Using Vendor Managed Services

MSPs are under pressure to maintain business continuity while ensuring that their clients’ security capabilities are not diminished in the face of growing cyber threats and IT staff shortages. So, what if you don’t have the staff or expertise to do it all? MSPs can save on security capabilities by using a security vendor’s managed services. This allows you to focus on your core competencies while outsourcing higher-level security management to the experts.

Spear Phishing Becomes Most Common Attack Technique in Q3 2023

Spear phishing was the most common attack technique in the third quarter of 2023, according to researchers at ReliaQuest. “In Q2 2023, spear phishing-related techniques represented the three most observed methods of attack,” the researchers write. “This remained true in Q3 2023, accounting for a total of almost 65% of all true-positive incidents.