Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Securing Lawyers and In-House Legal Teams from Cyber Risks

Whether they’re part of a law firm or in-house counsel within a company, lawyers handle sensitive information every day. That alone makes them prized targets for cybercriminals. The American Bar Association’s 2021 Technology Survey Report found that 25% of lawyers in the United States have experienced a data breach before.

How Does Keeper Protect Your Data? Security and Transparency.

Keeper Security’s zero-trust and zero-knowledge encryption model ensures that even in a worst case scenario, all of the contents of your Keeper vault would be protected with multiple layers of safeguards and encryption. Keeper has stood by its commitment to protect your most valuable data for more than a decade, through our best-in-class security model and transparent approach to sharing it with the public.

Bolstering Snyk's developer security platform in 2022

2022 was another record-breaking year for the Snyk platform. Helping an ever-growing number of customers find and fix issues across all the components making up their applications, the Snyk platform enabled over 2,500 customers during 2022 to import over 6.7 million projects, execute over 3 billion tests, and fix over 5 million issues!

How an Intrusion Detection System Can Save Your Business

The world of cybersecurity is extremely diligent. In a terrain that is ever-evolving, security experts need to combat a growing population of threat actors by deploying increasingly cultivated tools and techniques. Today, with enterprises functioning in an atmosphere that is more challenging than ever, Intrusion Detection Systems (IDS) play a vital role. As threats become more critical across the board, an Intrusion Detection System can save your business.

2023 Security Trends for APAC and the Evolving Role of CISOs

The focus on resilience is changing the role of security leaders in organizations today and will continue to do so in 2023. 2022 saw a lot of disruption in businesses, especially with rising cybercrime incidents. Cyber threats will only continue to grow and multiply due to the ongoing convergence of data, changing the discipline of cybersecurity altogether.

Devices: Prevent Users From Installing Printer Drivers

Devices: Prevent Users From Installing Printer Drivers, as the name suggests, is a security setting that prohibits unauthorized printer usage on specific devices. Once the setting is configured, the types and number of printers used on specific devices will be confined to the approved ones. The main purpose of limiting printer drivers’ installation and usage on workstations is to prevent people from printing unnecessary stuff, which would increase the cost of business operations.

MITRE ATT&CK and Windows registry key

MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) is a comprehensive knowledge base of tactics, techniques and procedures that adversaries use to conduct cyber-attacks. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations.

A fatal retweet: How the newest attack on Twitter can teach us a lesson on cybersecurity

In what may be the largest Twitter data breach attack to date, the personal data of over 400 million users was stolen from the social media giant’s grasp and put up for sale on the dark net on the day after Christmas. This attack couldn’t have happened at a worse time for the company, as the Irish Data Protection Commission (DPC) has announced an investigation into an earlier Twitter data leak in November 2022 that had affected over 5.4 million users.