Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

EP 66 - Post-Election Insights: AI, Misinformation and Security

In this episode of Trust Issues, host David Puner interviews James Imanian, Senior Director of the U.S. Federal Technology Office at CyberArk. They discuss the critical topic of election security, focusing on the recent 2024 U.S. presidential election. Drawing from his extensive background in cybersecurity including a career in the Navy and a stint at the U.S.

CIO POV: How Modern CIOs Wear (at Least) Seven Different Hats

When the title of chief information officer (CIO) first emerged in the early 1980s, it was very different from what it is today. Technology evolution, emerging threats and new realities have shifted the role from simply “keeping the lights on” to strategically “enabling the business” in every way.

API (In)security: The Hidden Risk of Black Friday

Black Friday may be the pinnacle of the holiday shopping season, a day when online retailers experience unprecedented traffic and revenue opportunities as consumers kick off the Christmas season. For many retailers, it’s a make-or-break event. Yet, with increased traffic comes increased risk, particularly as it relates to cybersecurity and keeping shoppers safe from fraud stemming from a cyberattack on their favorite digital store.

Gift or Grift? How Retailers Can Combat Cyber Threats This Season

A lot goes into deciding what to buy during the holiday shopping season – shipping times, sale prices, and finding the perfect gift for your niece (who is impossible to shop for) are likely to be at the top of your mind. Unfortunately, attackers are counting on that. An attacker’s best friend is urgency and Black Friday kicks off a perfect season for them.

The Essential Guide to Cyber Risk Quantification

Have you ever built software without encountering a single vulnerability? Unlikely. Vulnerabilities are an unavoidable fact of DevSecOps life, and the stakes are higher than before. Cybercrime expenditures are expected to exceed $9.5 trillion globally. Cyber risk quantification has become the need of the hour, not just for security teams and executives but also for developers.

How Are You Covering These New DORA ICT Resilience Requirements?

DORA’s public consultation period is over. If your organisation deals with the finances of people or other entities based in the EU or provides services to a firm that does, you will want to know how its rule set has changed. We’ve read through the Digital Operational Resilience Act (DORA) documentation and kept up to speed with the latest EU FSI regulation memos. The bottom line is that DORA remains a very demanding regulation with a huge scope.

PowerShell Write to File: "Out-File" and File Output Techniques

Anyone familiar with PowerShell knows that the output of PowerShell commands is displayed in the terminal by default. However, there may be situations where you would want to redirect or save output to a file. In short, redirecting or saving PowerShell output increases productivity, helps with debugging, provides useful logs, and facilitates automation, especially in complex workflows or when working with large datasets.

Smart Year-End IT Investments- A Trifecta for ROI

As the year wraps up, many IT, security, compliance, and HR teams have unspent budgets that won’t roll over. Rather than scrambling for last-minute, low-value purchases, why not make smart, strategic investments that will pay dividends in 2025 and beyond? Are you concerned about—reducing insider risk, increasing workforce productivity, and guarding against compliance fines?

Mastering Privileged Account and Session Management: 6 Best Practices to Implement in Your Organization

Cybercriminals will often target an organization’s privileged accounts, which provide a pathway to highly valuable assets. If compromised, privileged accounts and sessions can be used for malicious activity, potentially causing cybersecurity incidents. These incidents may lead to operational disruptions, financial losses, compliance issues, and reputational damage.