Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

The power of self-service and just-in-time access in PAM

The concept of privileged access management (PAM) has evolved over time, starting with the idea of role-based access control (RBAC) where permissions are assigned based on job roles. However, organizations soon realized that defining concrete roles for individuals was challenging due to the flexible and evolving nature of businesses. This led to the need for automating the access request process and empowering employees to self-serve and elevate their access based on their needs.

What We Learned from the 2023 Pen Testing Report

Fortra’s Core Security recently released its 2023 Pen Testing Report, and there’s plenty to see. In this year’s report, IT decision-makers can learn what their peers are saying about why they pen test, how often they pen test, and whether or not they’re pen testing in-house, among other topics. Each year, Core Security collects and produces some of the industry’s most relevant data on the state of pen testing today.

12 Best Practices for Banking and Financial Cybersecurity Compliance

Financial data is a desired target for cybercriminals. Hackers frequently attack financial institutions such as banks, loan services, investment and credit unions, and brokerage firms. Security incidents in the financial sector are extremely expensive (surpassed only by the healthcare industry), with the average total cost of a data breach reaching $4.35 million in 2022.

Gaming Risks: 9 Red Flags You Have a Security Breach

The rapid growth of the gaming industry over the past 20 years has attracted undesired attention from hackers and cybercriminals, making it imperative to address the risks and vulnerabilities that can compromise the security of gaming apps. To better prepare against future attacks, you need to know what are the exact online gaming risks. In this article, we will explore the challenges of online gaming security and highlight top key indicators of a security breach.

Cloud Threats Memo: Another State-Sponsored Actor Exploiting Dropbox

Be the first to receive the Cloud Threats Memo directly in your inbox by subscribing here. Charming Kitten (also known as APT35, TA453, Mint Sandstorm, Yellow Garuda) is a well-known prolific Iranian state-sponsored threat actor, particularly active through complex social engineering campaigns, against European, U.S., and Middle Eastern government and military personnel, academics, journalists, and organizations since at least 2014.

The 443 Podcast - Episode 250 - New Microsoft Office 0-Day

This week on the podcast we cover two stories that came out of Microsoft's July Patch Tuesday. The first involves an incident within Microsoft that lead to foreign cybercriminals compromising the email accounts of multiple government agencies. The second story involves an actively exploited 0-day vulnerability in Office that at the time of recording, remains unpatched.

TD Ameritrade Suffered a Breach: Investors are Concerned

TD Ameritrade is a large-scale investment company with more than 11 million clients throughout the world. The organization has more than 6,000 independent investment advisors, manages more than $1 trillion in assets, and is a big deal in the investing community. That's why it's frightening to learn that the company was breached recently and that personal and likely financial data was lost in the process.

Best Software for Managing the External Attack Surface in 2023

Your choice of external attack surface management software could significantly reduce your data breach risks, but only if it has the proper set of features. To learn which features to look out for in an external ASM solution, read on. Learn how UpGuard simplifies Attack Surface Management >