Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Random but Memorable - Episode 9.7: Delete Message Security Questions

On today’s show we react to WWDC, discuss everything new with iOS 16, and what Passkeys will mean for passwords. Plus we offer up an extended-edition of Watchtower Weekly and kick-off a brand new game! Who will stumble and be lost for words in our Security Question Generation Game?

Flow Use Case: Automate Continuous Firewall Traffic Monitoring

This Flow allows you to monitor all the traffic from your firewall by correlating it against a table that contains malicious IP addresses. If there is a match, Flow will generate an enriched event that will be logged in a designated my.app table. From this new table, you can take further action by creating detection rules to identify threats that put your organization at risk. Table of Contents.

Is Cyber Insurance Enough to Protect You?

Your cyber insurance won't protect you from ransomware. Here's why: It doesn't make your company resilient in and of itself. Think of it like regular house insurance: Just because you have insurance, it doesn't mean you shouldn't get a smoke alarm in your house and get contractors to check for gas leaks. Here are 2 recommendations to be prepared for a ransomware attack.

NJ TRANSIT Protects the Garden State passengers' economic and social well-being from cyber threats

NJ Transit, the nation's third-largest public transportation provider, delivered more than a quarter of a billion annual passenger trips before the pandemic and is responsible for its riders’ safety, mobility, and livelihoods every day. To ensure nothing interrupts the business, NJ TRANSIT, in partnership with Rubrik, prioritizes a strong data security strategy and is committed to the ongoing and necessary work that gives their data resilience and helps to reduce risk as they face ever-evolving, and inevitable, cyber threats.

MFA is better than passwords... Right? | Cybersecurity Sessions #8 with Roger Grimes

We’re told that multi-factor authentication is more secure than passwords, but in truth most MFA is susceptible to the same old threats, such as phishing and man-in-the-middle attacks. In fact, the widely championed advice to “use MFA, any MFA” could lead to a false sense of security and even more data breaches. In this episode, Andy sits down with Roger Grimes (Data-Driven Defense Evangelist, KnowBe4) to find out why MFA is vulnerable to exploitation, whether some MFAs are better than others, and what the future of secure authentication might look like.

Hello CISO - Episode 5: Enterprise Two-Factor Authentication

Is Multi-Factor Authentication (MFA) always a good idea? What type of threat does it protect against? Can IT leverage MFA to tighten security without negatively affecting productivity? In this episode of Hello CISO, Troy is talking MFA in the enterprise: what it is and, perhaps more importantly, what it isn't.