Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Compliance: The False Sense of Security

I know many will read this title and think that I am crazy. If I am compliant with NIST, HIPAA, ISO, PCI, etc., then I am running a secure network. And to a point that is true. But let’s look at it this way. If you are driving down the interstate at the posted speed limit and are keeping three car lengths between the driver in front of you, are you truly safe and secure on the interstate?

How to protect your business from remote work security risks

The Covid-19 pandemic caused a seismic shift in remote working practices. Before the pandemic, 34% of US employees worked remotely at least one day a week. Now, as we emerge from the pandemic, 35% of Americans work from home full-time — with a further 23% able to work remotely part-time. This equates to approximately 92 million remote workers in the US alone. But this rise in remote working is causing significant corporate cybersecurity issues.

Recovering from Ransomware with Rubrik

When ransomware strikes, it’s important to know your recovery options. Whether you need to blanket recover everything in one fell swoop, or you prefer a more surgical approach, Rubrik has your back. This video details how you can use Rubrik Security Cloud to recover from ransomware attacks and other scenarios quickly, and with confidence that you’re not accidentally restoring malware.

How To Test for SQL Injections [Complete Guide]

In theory, modern web frameworks provide secure ways of accessing databases, making SQL injections a non-issue. The reality looks much different. Among other injection vulnerabilities, SQL injections are still atop the OWASP Top 10, and organizations still frequently fall victim. Therefore there is no way around software security testing solutions that can reliably detect SQL injections.

Why misconfigurations continue to plague public cloud network services and how to avoid them

Cloud security as a strategy is constantly evolving to meet the needs of organizations for scale, agility, and security. If your organization is weighing the merits of the use of public cloud versus private cloud, here are a few facts to keep in mind.

Cyber Attack on IHG Disrupts Hotel Booking System | Concerns on Private Data Leakage

IHG Hotels & Resorts, the hotel group that owns the Holiday Inn and Intercontinental brands, experienced a cyber attack in the first week of September. The attack has impacted the central hotel’s booking system and mobile apps, causing a service outage for several days. Loyalty program members could not log in or create new bookings during this time.