Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Digital Identity

Double Dipping Cheat Developer Gets Caught Red-Handed

Following our post “A Brief History of Game Cheating,” it’s safe to say that cheats, no matter how lucrative or premium they might look, always carry a degree of danger. Today’s story revolves around the developer of the popular EvolvedAim, a cheat for Escape From Tarkov. He sold his tool with an information stealer bundled with it, double-dipping and causing damage to his clients and to the game itself.

A Brief History of Game Cheating

Over the short span of video game cheating, both cheaters and game developers have evolved in many ways; this includes everything from modification of important game variables (like health) by using tools like Cheat Engine. In addition, game botting impacts both game and real-life economies. However, using modern-day anti-cheat methods is also not without danger, as modern protection tools run on the kernel level and can be abused for malicious impact on the system.

5 Strategies for Setting the Right Cybersecurity KPIs

Cybersecurity key performance indicators (KPIs) measure the efficacy of an organization’s cybersecurity program. In a rapidly changing threat landscape characterized by new identities, environments and attack methods, many potential KPIs exist to track. Measuring too many things can be distracting or misleading, while not measuring enough can create gaps in understanding and protection.

How To Configure PAM with DUO MFA | CyberArk

In this video, we walk you through the step-by-step process of configuring PAM (Pluggable Authentication Modules) and DUO Multi-Factor Authentication (MFA) with CyberArk. Strengthen your security posture and ensure robust access control for your sensitive data and systems. What You'll Learn: Tools and Resources: CyberArk DUO MFA Pluggable Authentication Modules (PAM) Step-by-Step Instructions.

Mission Possible: Securing Developer Access, CI/CD and Code (With Love)

Okay, so you’re a security leader at your enterprise – congratulations! It’s a big, challenging role, as you know too well. You or a colleague are likely responsible for securing the cloud and legacy apps that drive critical revenue and customer engagement for your organization. But it’s not just the apps you need to secure.

5 Best Identity and Access Management (IAM) Solutions 2024

In modern business environments, managing user identities and access securely and efficiently is crucial for organizations of all sizes. Identity and Access Management (IAM) solutions help businesses control who has access to their systems, applications, and data. Therefore, the need for robust identity management solutions is more critical than ever. This blog highlights the 5 best IAM solutions for 2024, each offering unique features and benefits to enhance your organization's security posture. Discover why these solutions stand out and how they can meet your IAM needs.

EP 57 - Proactive Defense: Security's AI Infusion

In this episode of the Trust Issues podcast, we explore the transformative impact of artificial intelligence (AI) on identity security. Guest Peretz Regev, CyberArk’s Chief Product Officer, joins host David Puner, for a discussion about how AI is reshaping cyber protection, offering solutions that are as intelligent as they are intuitive. With the ability to predict threats and adapt with unprecedented agility, AI is ushering in a new era of proactive security.

How Identity Security Enhances Network and Endpoint Security

The intersection of identity, endpoint, and network security is becoming increasingly self-evident. Despite all their efforts, modern organizations continue to struggle to safeguard their data and prevent unauthorized access. The Verizon Data Breach Investigations report for 2024 continues to highlight that human elements were a component of 68% of breaches.

The Importance of Know Your Business (KYB) in the Fintech World

In the dynamic and rapidly evolving fintech industry, regulatory compliance and risk management are crucial for maintaining trust and ensuring sustainability. One critical component of this regulatory framework is the Know Your Business (KYB) process. KYB involves verifying the legitimacy and credentials of business clients and partners, ensuring they are who they claim to be, and assessing their potential risks. In the fintech world, KYB is essential for mitigating fraud, ensuring compliance with regulations, and fostering a trustworthy ecosystem.

CIO POV: Rethinking Data Security Post-Snowflake Customer Attacks

Watching the recent Snowflake customer attacks unfold felt a bit like rewatching a horror movie with predictable attack sequences and missed opportunities to run to safety. But this time, the ending was far more devasting. More than 100 organizations were exposed, and many are now grappling with the impacts of data theft and extortion in what some are calling one of the largest breaches in history.