Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Online Retailer Checks Out Rezilion, Solves Vulnerability Backlog Burden

Rezilion recently worked with an online retailer seeking security, efficiency, and time savings in dealing with their vulnerability backlog. Cumbersome vulnerability backlogs are a problem for most organizations. In fact, research from Ponemon Institute reveals that 66% of security leaders say they have a vulnerability backlog of over 100,000 vulnerabilities. Even more alarming, the research finds that 54% say they were able to patch less than 50% of vulnerabilities in the backlog.

Cloud Threats Memo: Understanding the Dead Drop Resolver Technique

If I asked you what the common ways to exploit a cloud app for malicious purposes are, I bet your answer would probably be either to use it to distribute malicious content (such as malware or phishing pages), or to host the command and control (C2) infrastructure. In reality another frequent technique is the dead drop resolver, where a legitimate service is abused by threat actors to host the information related to the C2 infrastructure rather than the C2 infrastructure itself.

Why Passport Verification is key to Secure Housing & other Industries

Passport verification is a process that is used to confirm a person’s identity using their passport as proof of identification. In the housing industry, this process is commonly used to verify the identity of prospective tenants or buyers before they are allowed to rent or purchase a property. This is often done as part of the overall background check process to ensure that the person is who they claim to be and to protect against fraud or other illegal activities.

Our Customers Have Spoken: CrowdStrike Delivers the Best in EDR, EPP and XDR

Time and again, analyst reports, independent tests and numerous other awards and acknowledgements affirm CrowdStrike is a leader in cybersecurity. Why is this important? Because when CrowdStrike is #1, it’s our customers who win. But to us, the best validation of the power of the CrowdStrike Falcon® platform comes from our customers themselves. We are proud to have earned the trust of so many organizations — over 20,000 customers and counting — around the world.

DoD Identifies API Security as Critical for Zero Trust

The opening line of the newly published Department of Defense (DoD) Zero Trust Strategy should be a warning to all: “Our adversaries are in our networks, exfiltrating our data, and exploiting the Department’s users.”1 Numerous users and devices across geographic boundaries, various hardware and software supply chains, internal and external facing applications, sophisticated malicious actors, and sensitive data that moves easily as electrons certainly present challenges for cyber defen

How to Deploy Egnyte's Project Templates in 3 Simple Steps to Save Time on Project Set-up

‍ If you're an architect, builder, or engineer, you know that one of the most time-consuming parts of starting a new project is setting up the permissions for each subfolder. You must set the permissions for the same folders over and over again for every new project, which can really start to eat into your billable hours. Fortunately, there's a way to save yourself some time by using project templates.

5 Best Private and Secure Internet Web Browsers to Replace Chrome With

Your internet browser is the interface you use to access the internet. As such, it knows and handles a lot of your data. Unfortunately, browsers are also data collection tools for advertisers and marketers. They track your web activities to monetize you through their advertising partners with targeted ads. Also, let’s not forget the cybercriminals looking for data to steal. Most browsers store your browsing history. Also, cookies and trackers in the browsers monitor your every digital footprint.

Elastic + Tidal making MITRE ATT&CK easier

Security vendors seem to have a complicated relationship with the MITRE ATT&CK(™) matrix. With one hand, they hold it high as a powerful resource, and with the other, they criticize some aspect of it. But regardless of your viewpoint on any given day, ATT&CK is one of the most important resources for improving your understanding of threat capabilities and aligning those to technical controls, countermeasures, or mitigations.