Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

In Times of Ransom(every)ware, Unified Security is Essential

Following a series of headline-grabbing ransomware attacks that disrupted critical services in the US, FBI Director Christopher Wray likened the threat posed by ransomware to the September 11 terrorist attacks of 2001. According to Wray, recent attacks against one of the largest oil pipeline operators in the United States and a major meat processing operation may be just a harbinger of what is to come.

CISO Interview Series: Investing in Frameworks, Humans, and Your Technical Skills

The journey for someone to the role of Chief Information Security Officer (CISO) isn’t often straightforward. Take Sandy Dunn, for example. Per SailPoint, Sandy started as a paper delivery kid at 10 years old. She then worked her way through software sales, insurance, and even horses before becoming the CISO of a health insurance provider in Idaho. All these “entry-level” jobs share one thing in common.

Top 3 Grooming Techniques in Fraud: What to Watch for

Grooming is a method of establishing a connection with a person to perpetrate a crime against them. Grooming is becoming more common in fraud, both online as well as in interpersonal interactions. What’s more, scammers are getting more sophisticated in their techniques. There is a mistaken belief that scammers are forceful, arrogant, and therefore easy to spot, but many play a long game, carefully and patiently grooming the victim before asking for money.

You've inherited a digital estate plan: Now what?

With each passing year, our digital lives grow in size and complexity. We open new accounts and place more value on the ones we log into and use every day. The trend has led to a rise in digital estate plans – a handover that ensures your friends and family members can take over your most precious accounts after you’ve gone.

Securing Google Cloud Platform with Sysdig

Together with Google Cloud, Sysdig reduces your cloud security risk. So you can confidently run your workloads on Google Cloud. Get started in minutes with Sysdig SaaS, and simplify security, compliance, and monitoring. Accelerate your growth with NO backend data management. # CSPM Sysdig is your centralized safe place to enhance cloud security posture. # Threat detection Plug in Google Cloud Audit logs And get started quickly with our out-of-the-box Falco rules.

Popular JavaScript Library ua-parser-js Compromised via Account Takeover

A few hours ago, an npm package with more than 7 million weekly downloads was compromised. It appears an ATO (account takeover) occurred in which the author’s account was hijacked either due to a password leakage or a brute force attempt (GitHub discussion).

What is DNS hijacking? Redirection Attacks Explained (and Prevention)

Almost everybody in this world uses the Internet. Some use it for work, some for education, some to stay connected with the world and their loved ones, some for shopping, and some use it to browse the world wide web in their leisure time. DNS Hijacking or DNS redirection attacks are a widespread security threat many DNS servers face in today’s modern digital world.