Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Netacea

Is your security strategy too focused on the next SolarWinds or Log4j?

Cyber-attacks happen around the clock, far more often than can ever be reported outside of the organizations they affect. But sometimes an attack is so widespread and devastating that it sends shockwaves through the business world and even into the mainstream media. Incidents like SolarWinds and Log4j were front page news, sending organizations scrambling to patch them.

Cybersecurity Sessions podcast: My favorite moments from the first ten episodes

Almost a year ago, I took on a new challenge: Start a podcast about cybersecurity – The Cybersecurity Sessions, hosted by Netacea co-founder and CPO Andy Still. To be honest it’s not always easy finding the time to record the podcast between Andy’s more business-critical duties, but it’s a task he’s looked forward to greatly each month since last November. That’s because, like me, Andy is always seeking out new perspectives and information.

Ethical hacking & bug bounty hunting | Cybersecurity Sessions #11 with Jessica Haworth

Cyber-criminals are relentless, and the number of attacks is growing. Businesses are increasingly turning to ethical hackers to find bugs and exploits before attackers do, offering financial incentives for their efforts. As a security researcher, our host Cyril Noel-Tagoe is always on the hunt for new vulnerabilities. He’s joined for this episode by ethical hacking enthusiast and Daily Swig reporter Jessica Haworth, who has a finger firmly on the pulse of the latest bug bounty programs and developments.

LastPass hacked: Why you should still trust password managers

In August 2022, password management company LastPass fell victim to a cyberattack, in which hackers breached its systems and stole its source code. LastPass’s success is built around offering secure, trustworthy software, so a hack like this could be seen as a knock against the company — but it also impacts wider public trust in password management software.

The Future of Cybersecurity: How Will We Protect Ourselves in the Years to Come?

Cyberthreats are one of the most significant challenges facing society today. From illegal political influence to personal data theft, cyberattacks are already posing a huge problem for governments, businesses, and individuals. And as attacks become more sophisticated, it’s getting harder to protect ourselves online. So, what can we expect from the future of cybersecurity? Is it possible to keep up with the speed and complexity of these advancing attacks?

ReCAPTCHA 101: Is it the best way to block bots in 2022?

Bots now make up more than 43% of all internet traffic. It’s a growing problem — there are now almost twice as many bad bots as good bots. That’s why site administrators use programs like reCAPTCHA to block bots from accessing their websites, apps, and APIs. Bots aren’t a new problem. Back in 1950, Alan Turing created the Turing Test: a game designed to test a program’s ability to pass as a human.

How to reduce alert overload in cybersecurity

Cyberattacks cost businesses trillions of dollars every year in lost productivity, lost business, and legal penalties. So companies try to solve the problem by signing up for as many WAFs, NIDS, and bolt-on bot bundlers as they think they need. But while these systems can help stop cyberattacks, they also cause another problem: alert overload. Alert overload happens when your security team is inundated with notifications about possible threats to your system.

Can your business justify the cost of bot management?

‘Measure the Real Cost of Cybersecurity Protection’, by Gartner® analysts Stewart Buchanan, Paul Proctor and Bryan Hayes, is available for a complimentary download from the Netacea website until 31st August 2022. We think the report teaches how to use outcome-driven metrics to set protection-level agreements (PLAs), gaining business stakeholder support and the budget approval needed to deliver them.

Uncovering the scraper bots plaguing APIs

Most cyber threats — like credential stuffing and card cracking — are committed by fraudsters with the aim of stealing money, data, or both. The law is clear on these cyberattacks: online fraud is illegal. But unlike these overtly malicious threats, web scraping isn’t always illegal, or even unethical. Aggregator sites like travel agencies and price comparison websites use scraper bots to help customers find the best deals.

Mentoring in cybersecurity | Cybersecurity Sessions #10 with Gabrielle Botbol

Mentoring is essential to closing the cybersecurity skills gap, especially in realizing the potential of people from underrepresented communities. In recent years many newcomers to cyber have been mentored by Gabrielle Botbol. Since teaching herself how to be a pentester, she has become recognized as one of Canada’s top 20 women in cybersecurity. Andy Still finds out how Gabrielle entered the world of cybersecurity after leaving another vocation, and how she is helping the next generation of women and underrepresented communities follow her ‘six steps to becoming a pentester’.