Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why Pixels/Trackers are Common and Abundant

As part of a detailed study of pixels/trackers, an analysis of over 3,000 websites and over 100,000 associated webpages (using the client-side security scanning feature of Feroot Inspector) found pixels/trackers on 95% of their websites. Each website in the study corresponds to an unique organization (company, non-profit, or government agency). The high 95% reflects the extent of data harvesting that is done by marketing, advertising, and performance platforms today.

Fraudulent Tax Filings Go Out For Harding, Shymanski, and Company Customers

Harding, Shymanski, and Company is a major accounting firm that works with customers providing them with tax help and other financial services. The company recently suffered from a data breach that exposed many of its clients and led to fraudulent tax filings for the 2022 tax year. The company employs more than 142 people and has an approximate annual revenue of $28 million. A large number of individuals were impacted by this very serious data breach.

Introducing CrowdStream: Simplifying XDR Adoption and Solving Security's Data Challenge

Stronger together. Never has an RSA conference theme been more aligned to CrowdStrike’s mission and vision for the future. If you look at our presence at RSAC 2023, CrowdStrike sits at the center of the security ecosystem. Everything we’re doing — from our partner breakfast to partner talks in our booth to our company announcements — highlights our commitment to bringing together the world’s best technology and data to deliver the best security outcomes.

Best Practices for Responding to a GRC Vendor Assessment

Answering a GRC (Governance, Risk, and Compliance) vendor assessment is an important step for companies that want to demonstrate their commitment to compliance and risk management to potential customers. In this piece, we’ll cover how you can best respond to a prospect’s vendor assessment so you both can seal the deal. By following these best practices, you’ll be able to provide a comprehensive and accurate response to the assessment and establish a positive working relationship.

ChatGPT DLP Filtering: How to Use ChatGPT without Exposing Customer Data

Advancements in AI have led to the creation of generative AI systems like ChatGPT, which can generate human-like responses to text-based inputs. However, these inputs are at the discretion of the user and they aren’t automatically filtered for sensitive data. This means that these systems can also be used to generate content from sensitive data, such as medical records, financial information, or personal details.

Beyond the ransom: Unpacking the true cost of a ransomware attack

Ransomware has become a significant threat in today’s digital landscape, with cybercriminals using it as an effective means of making money, often with a low cost and high profit margin. Victims rarely recover their stolen data in full, despite promises from the perpetrators, so most of the time paying the ransom is not a viable solution.

Part 2: Is an RFP the Best Use of Your Organization's Resources?

Yesterday I wrote about some common Request for Proposal (RFP) pitfalls we have seen over the years at Trustwave. (part 1) Trustwave offers a wide range of services — from Managed Detection & Response (MDR), Managed SIEM services from Splunk, Qradar, and Microsoft Sentinel security testing, to complex red team engagements, so we‘ve seen numerous of styles and approaches in the format and presentation of the requests.

4 best practices for cultivating developer security adoption

Implementing adequate software supply chain security is a challenging feat in 2023. Attackers are becoming more sophisticated, and the growing complexity of modern applications makes them difficult to defend. We’re talking microservices, multi-cloud environments, and complex workflows — all moving at the speed of business. To address these challenges, the Snyk team organized two roundtable discussions, one held in North America and the other in EMEA.

Thousands of Unlimited Care Inc Employees Lose Their Data in Recent Breach

Unlimited Care Inc. is a home health company that offers help to patients in Westchester, New York, and surrounding locations. The company employs more than 2,500 people and has an annual revenue of more than $250 million. The organization recently suffered from a data attack that could have compromised a large number of company employees.