Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

17 Ways To Prevent Insider Threats: Steps, Tips & Tools

When you think of cybersecurity, your mind likely goes to external threat actors — malware, ransomware, spearphishing attacks, and other malicious activity. However, it’s crucial to note that 60% of data breaches are caused by insider threats, and a staggering 74% of organizations are at least moderately vulnerable to them. It’s not everybody else your organization needs to worry about; it’s your own people.

The cyber threat landscape in Japan - risks, threats and mitigation guidance

In our recent research “Better Safe Than Sorry”, we reported how the number of exposed OT/ICS devices in Japan grew by 372% over the past six years. During this time, several notable cyber-attacks targeted businesses and government entities in Japan. The substantial increase in exposed OT/ICS combined with the recent cyber-attacks in Japan has prompted us to give a deeper look at the current threat landscape in the country.

Introducing enterprise-ready capabilities to help you manage compliance at scale

Today we’re excited to announce new and enhanced enterprise-grade platform capabilities that build upon our existing enterprise capabilities and customization functionality. Along with our new AI-powered Trust Center announced today, these capabilities enable mature organizations to run their security and compliance programs and demonstrate trust at scale.

North Korean Threat Actors Target Software Developers With Phony Job Interviews

Suspected North Korean threat actors are attempting to trick software developers into downloading malware during phony job interviews, according to researchers at Securonix. The threat actors contact software developers with seemingly legitimate employment opportunities before scheduling virtual job interviews.

Hacking Cybersecurity Training: Escape Rooms & Entrepreneurial Thinking with Amy Stokes-Waters

Join us on this week's edition of the Razorwire podcast where host Jim chats with Amy Stokes-Waters, CEO of The Cyber Escape Room Co. Amy, transitioning from a non-traditional background into cybersecurity, shares her entrepreneurial journey and innovative approach to security awareness training through engaging escape room experiences.

UK Creates New Laws to Safeguard Consumers Against Cyber Threats Posed by Smart Devices

As 99% of UK adults now own at least one smart device, and the average UK household enjoys the benefits of nine connected devices, the timing of new laws designed to protect consumers from hacking and cyber-attacks while using internet-connected smart devices couldn't be more timely.

Insider Threats: Shocking Offer Outside Tesla Reveals Cybersecurity Risks

Amy Stokes-Waters discusses a real-world attempt to bribe a Tesla employee for secure access, highlighting the overlooked dangers of insider threats in cybersecurity. Discover the risks businesses face from both internal and outsourced hacking efforts, and why robust security measures are crucial. Tune in for more insights into the hidden world of corporate espionage and its impact on information security.

The Evolving Landscape of LLM Security Threats: Staying Ahead of the Curve

The rapid advancements in large language models (LLMs) have revolutionized how we interact with technology, powering various applications for different use cases. As the adoption of LLM-powered solutions continues to grow, so does the emergence of new and evolving security threats that aim to exploit these robust AI systems.

Crafting An Effective Insider Threat Incident Response Plan

Organizations face many threats today, but not all potential threats are from malicious activities outside the organization. Insider threats are just as significant, if not more significant, of a security risk to companies today. Since 2018, there has been a 40% increase in data breaches caused by company insiders, so they now represent most of them.