Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Quickbase's Rebecca Harness: Securely engaging with technology partners and third-party vendors and overcoming the inevitability of human error

In this episode of The Future of Security Operations podcast, Thomas chats with Rebecca Harness, VP and Chief Information Security Officer at Quickbase. Quickbase is a no-code database and application development platform that enables anyone to safely build, iterate, and integrate their applications. Rebecca has 25 years of experience in information technology and over 12 years of experience in security specifically.

Mitigating Risks for Forex Brokers

Managing risk is a paramount concern for Forex brokers. MetaTrader 4 and 5 platforms offer a robust suite of risk management tools that enable brokers to protect themselves and their clients from potential losses. In this article, we will explore the key risk management features and functionalities of MT4 and MT and discuss how brokers can effectively utilize them to mitigate risks and ensure a secure trading environment.
Sponsored Post

What is a SOC and Why it Matters for Security

A Security Operations Center (SOC) is a centralized unit responsible for monitoring, detecting, analyzing, and responding to security incidents within an organization's IT infrastructure. The primary objective of a SOC is to safeguard the confidentiality, integrity, and availability of an organization's critical data.

Data Exfiltration: What It Is, Examples, and Prevention Tips

Data security is vital to your organization’s well-being. Even a single data exfiltration incident can bring unwanted attention to your organization, leading to reputational and financial losses. That’s why companies across industries pay maximum attention to their cybersecurity measures and constantly enhance them. In this article, we explain the meaning of data exfiltration and how it’s performed.

HCA Healthcare Loses Data for Over 11 Million in Recent Breach

HCA Healthcare is one of the largest health systems in the United States today. The company has millions of patients and manages data for countless hospitals, private practices, specialty offices, and more. With such a substantial volume of healthcare data contained in one location, the information is vulnerable to attack. That's exactly what happened to HCA Healthcare. The company suffered a data attack that left it with substantial losses.

Threat Actors Add ".Zip" Domains to Phishbait

Cybercriminals are exploiting the introduction of “.ZIP” as a new generic Top-Level Domain (gTLD) to launch phishing attacks, according to researchers at Fortinet. “Cybercriminals are always on the lookout for new opportunities and techniques to exploit, and the recent availability of '.ZIP' domains for public purchase has unfortunately created such an opportunity,” the researchers write.

Real-time authorization with Enterprise OPA and gRPC

In this article, you will learn about how to achieve high-throughput, real-time authorization. You should gain a basic understanding of the different protocols for interacting with the Open Policy Agent (OPA) and Styra Enterprise OPA APIs, as well as how and when to use different options. We will also cover the strengths of different protocol choices, and where they may make sense in your system architecture.

Best practices for using AI in the SDLC

AI has become a hot topic thanks to the recent headlines around the large language model (LLM) AI with a simple interface — ChatGPT. Since then, the AI field has been vibrant, with several major actors racing to provide ever-bigger, better, and more versatile models. Players like Microsoft, NVidia, Google, Meta, and open source projects have all published a list of new models. In fact, a leaked Google document makes it seem that these models will be ubiquitous and available to everyone soon.