Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Helix Electric Takes Data Accessibility and Security to the Next Level

Learn how Helix Electric took data accessibility and security to the next level with Egnyte. By consolidating all their data onto a single platform, employees on the jobsite have fast and easy access to drawings, cut sheets and contract documents -- no matter where they are working. And in the case of a ransomware attack, Egnyte’s built-in detection and recovery reduces any downtime and allows Helix to get operations back up and running quickly. And with data governance and classification features, Egnyte is foundational to Helix’s CMMC 2.0 program.

Vidar Malware Launcher Concealed in Help File

Appending a malicious file to an unsuspecting file format is one of the tricks our adversaries use to evade detection. Recently, we came across an interesting email campaign employing this technique to deliver the info stealer Vidar malware. First, let’s examine the email delivery mechanism, then go on to take a closer look at the Vidar malware itself. Figure 1: The malicious spam message The messages in this campaign have two things in common.

How to Reduce the Risk of Former Employees Coordinating with Insider Threats

When it comes time for an employee to leave your organization, you want it to be on friendly terms. But there are definitely limits to how friendly you want folks to be after they leave. Especially when it comes to accessing materials from their old position for their new endeavors. In a recent bizarre case, it was reported that a former acting Department of Homeland Security Inspector General has pleaded guilty to stealing government software and data for use in his own product.

How can an external network penetration test help your business? | Cyphere

An external network penetration test is a process by which an organization hires a third party to attempt to penetrate its computer systems from the outside (over the Internet). By doing so, businesses can discover vulnerabilities in their networks that could be exploited by malicious actors and recommend relevant risk mitigation measures. In this video, we discuss the benefits of external network penetration testing and how it can help your business stay safe online.

How To Set A Benchmark Of False Positives With SAST Tools

Many Static Application Security Testing (SAST) tools struggle with false positives. They often report that a vulnerability is present, while, in reality, it does not exist. This inaccuracy weighs down the engineering team, as they spend productive hours triaging the false alarms. By setting a benchmark of false positives — a limit, above which is unacceptable — you can establish a point of reference or standard against which to measure the efficacy of your SAST tool.

Move aside, Conti, Lapsus$ coming through!

-In the hours after news broke that Lapsus$ claimed to have breached Okta, an enterprise identity and access management firm, SecurityScorecard’s Threat Research and Intelligence team conducted a rapid investigation into Lapsus$ to provide customers and partners with the very latest in actionable security intelligence and insights related to this emerging cybercrime group. -Lapsus$’s targets have quickly evolved from Brazilian and Portuguese organizations to high-profile U.S.

SOC Automation: 3 Use Cases to Reduce Analyst Burnout

As revealed in the 2021 Devo SOC Performance ReportTM — which is based on the results of a survey of more than 1,000 security practitioners — organizations are frustrated with their SOC’s lack of effectiveness in performing its vital work. To combat the concerns the survey identified, it’s important for SOCs to refine how they operate.

Understanding and Defining Practical Security Operations Metrics

In the business of security, linking performance metrics to strategy has become an accepted best practice. If strategy is the blueprint for building a security operations center (SOC), metrics are the raw materials. But there is a catch: a security organization can easily lose sight of its strategy and instead focus strictly on the metrics that are meant to represent it.