Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cyberattack Maps Explained: The Value & Limitations of Cyber Attack Maps

While most people understand that cybercrime is rising, it’s challenging to fathom just how widespread it is. In 2007, researchers found there was a cyberattack every 39 seconds. By 2022, those numbers seemed small and innocent in comparison: The sheer scale of attacks makes it a challenge to understand and find emerging threats or identify trends. Cyberattack maps provide visuals that clarify numbers that can be otherwise difficult to understand and bring to light the dark activities online.

NIST Cybersecurity Framework - All You Need To Know

The advent of technology and its latest innovations has come with its own challenges in the form of cyber attacks, and data theft, and protecting themselves from them is a task for most organizations and if not done properly, can leave the organizations vulnerable. This Blog Includes show What is NIST cybersecurity framework? All About NIST Why Is NIST Important? Make your Website / Web Application the safest place on the Internet.

MFA phishing: the cyberattack that is compromising big company networks

Cybercriminals are well versed in the tactic of phishing, which aim to trick users into revealing confidential information and gain unauthorized access to user accounts and compromise corporate networks. A new type of phishing attack has now emerged, known as MFA phishing, which manages to evade the key protection measures deployed by corporate networks.

Social Media Privacy: Which Social Platforms Are the Most Secure

Social media has become an integral part of our lives, enabling us to connect with friends, share experiences, and express ourselves. However, with the increasing reliance on social media platforms, concerns about online privacy and data security have also emerged. So which social platforms are private and which ones are not? Are there any more private alternatives to the traditional platforms we all know and use?

Insider Threats Packing Their Bags With Corporate Data

The insider story, whether it is a disgruntled or negligent employee, is one that is familiar to many organizations. The 2020 Securonix Insider Threat Report found that 60% of the insider threat cases they dealt with involved a “flight risk” employee, or an individual that is getting ready to leave their employment.

Properly Explaining Risk Appetite to the C-Suite

In the first part of this series, we looked at some common issues when a Chief Information Security Officer (CISO) is communicating with the Board. At the heart of many of these issues is how the CISO and upper management view security. As one CISO recently told me, "It's a catch-22 situation: If the business leaders don't consider this to be a business problem, they are unlikely to listen to people they don't consider to be business leaders telling them it is.".

Preparing Employees to Combat Phishing - Closing the Learning Loop

Phishing emails are a tremendous threat and one of the most common vehicles cyber criminals use to trick employees and succeed in their attacks. Cybercriminals are on a mission to gain access to sensitive information, such as login credentials, business information, customer data, or financial data. Despite the best efforts by IT departments and security professionals to put the proper filters in place, cybercriminals still often find a way to get into employee inboxes with their phishing schemes.

More Kudos for Salt Leadership in Delivering API Security to Financial Services Firms!

The accolades continue for Salt Security! Hot on the heels of being named in Inc.’s Best Workplaces 2023, our platform has now been included in the CyberTech 100 list, which highlights the top companies in cybersecurity for financial services organizations. These company recognitions also follow a slew of recent awards for us, among them the Ally Technology Peace of Mind award presented by Ally Financial, the largest US digital-only bank and auto finance company.

McPherson Hospital Suffers a Data Breach Exposing Data For Up to 19k Patients

McPherson Hospital is a large-scale health facility in McPherson, Kansas. The hospital employs more than 225 people and offers walk-in care, emergency care, primary care services, and a range of specialty health services. This large facility generates approximately $7 million in revenue annually. It was hit by a data breach recently, risking the information of patients significantly.

Kubescape & Jit

Kubescape is an open-source, CNCF sandbox, end-to-end Kubernetes security tool designed to assess the security posture of Kubernetes clusters created by ARMO. It helps identify security risks and misconfigurations that could potentially be exploited by attackers, and provides automatic assistance to remediate them. Kubescape was launched less than two years ago, in August 2021, and already has more than 8.3K stars on GitHub, and over 100 open-source contributors.