Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

An Easy Guide to Understanding Risk Management and Quantification, Part 1

When it comes to securing your enterprise and keeping it safe, your success depends on effective communication. How can you explain cyber risks to the board in a way that's easy to understand, yet still packs a punch? Cyber Risk Quantification (CRQ) is a methodological approach that allows security teams to measure and quantify cyber risks in financial terms.

What Are Image Upload Issues on WordPress and How to Solve Them

WordPress is renowned content management system has empowered countless users to design and run their websites seamlessly. However, even the best platforms can run into problems - one notable concern being issues related to image uploading on WordPress. Let's get into common reasons behind such problems and offer systematic solutions.

The Top 5 Vendor-Neutral Cloud Security Certifications of 2023

All segments of the cloud market are predicted to see growth in 2023, according to research by Gartner. In an April Press Release, the firm forecasts that global spending on public cloud services will exceed 21% this year, totaling $597.3 billion overall in 2023. This is up over $100 billion from last year’s (mere) $491 billion.

Cybersecurity: Creating a Foundation to build on

The cybersecurity landscape has become more complex for many reasons. For one, it is the constantly changing risk environment where businesses are compelled to confront evolving threats and actors that leverage emerging technologies and advanced tactics. Cybersecurity has become a top priority for boards since they realize that being cyber resilient is a strategic choice and a competitive advantage.

Reproducing common attacks in the cloud with Stratus Red Team

Stratus Red Team is a project that allows you to easily reproduce, understand, and detect common attack techniques in the cloud. As a self-contained tool, you can also use it to validate your threat detection logic. In this video, Christophe walks through the use of Stratus Red Team to reproduce a common AWS attack.

What Data Breaches Tell Us: An Analysis of 17,000 U.S. Data Breaches

Data breach attacks are serious problems for companies, organizations and institutions all over the world. For example, in the US one data breach costs on average 9.4 Million USD, which is the highest worldwide. To handle—or ideally, prevent—these attacks, we need to understand first the “why” and “how” of an attack. With this objective in mind, Bitsight analyzed more than 17,000 data breach events from the last seven years affecting 23 sectors in the US.

Record ¥3 bil stolen via phishing in Japan in 1st half of 2023

A record 2,322 scams in Japan to steal internet banking IDs and passwords have resulted in unauthorized money transfers totaling a record of around 3 billion yen ($21 million) in the first half of this year, a report by the National Police Agency showed Tuesday. The number of cases mainly involving phishing this year has already surpassed the annual total of any previous year, with the financial loss approaching the record high of 3.07 billion yen set in 2015, according to the agency.

New PCI Password Requirements Could Be the Impetus for Credential Harvesting Scams

As the retirement countdown for the current version of PCI is now less than six months, a new standard for password length, complexity, and change frequency may create some risk. Valid credentials have become a very hot item, as threat actors realize the low risk and high value of simply becoming an Initial Access Broker (rather than performing an entire cyber attack themselves).