Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SafeBreach Coverage for US-CERT Alert (AA23-136A) - BianLian Ransomware Group

On May 16th, Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and Australian Cyber Security Centre (ACSC) released an advisory highlighting the various malicious indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) being leveraged by the BianLian ransomware group.

Unveiling the Future of AI in Cybersecurity

Welcome to our latest podcast episode, where we delve into the fascinating realm of AI in cybersecurity. Phil Agcaoili, the esteemed entrepreneur, and former CISO professional, joins us in this fascinating discussion. Alongside our hosts, Max Aulakh and Joel Yonts, we unravel the profound impact of artificial intelligence on cybersecurity, compliance, and the workforce.

Is Privileged Access Management Important for SMBs?

Yes, Privileged Access Management (PAM) is important for Small and Medium-Sized Businesses (SMBs). Any business that has privileged systems and accounts to secure and manage needs a PAM solution. Without a PAM solution in place, businesses are at a greater risk of suffering a cyberattack which can be financially and reputationally devastating. Continue reading to learn more about privileged access management and how it benefits SMBs.

Recession Planning: Min-maxing Your Cybersecurity Program for Better Business Outcomes

Over the last two years, digital transformation has accelerated at breakneck speed, opening new lines of business that meet user demand. Reality is, online banking, order-ahead meals, telehealth appointments, and online grocery shopping are no longer optional. Users expect these to be available 24/7, so any business that wants to compete and values customer loyalty needs to digitize its services as much as possible.

Cloudflare Equips Organisations with the Zero Trust Security They Need to Safely Use Generative AI

Now companies can give their teams the productivity and innovation of emerging generative AI - while reducing risk with built-in security and governance controls over the flow of data.

The Top Compliance Regulations for Financial Institutions

Financial institutions experience a level of regulatory burden and security compliance requirements that few other industries must contend with. Since they’re a central target for attackers due to the money they move and the vast amounts of data they possess, they’ve become a central focus for regulators due to the danger to the global economy should one of them fall victim to a breach.

76% of vulnerabilities exploited in 2022 were up to 13 years old

Something as common and widely known as a software update can prevent major cyberattacks from happening, as they incorporate patches that fix system vulnerabilities. Prioritizing updates may seem a burdensome and inconvenient task for users, because computers and servers have to restart to perform installation, which interrupts users when they are working.

NYSE TV interview with Egnyte Co-Founder and CEO, Vineet Jain

Vineet is the CEO and co-founder of Egnyte. Prior to Egnyte, Vineet founded and successfully built Valdero, a supply chain software solution provider, funded by KPCB, MDV and Trinity Ventures. He has held a rich variety of senior operational positions at KPMG and Bechtel. He has 20 years of experience in building capital-efficient and nimble organizations. Vineet earned a BS in Engineering from Delhi College of Engineering and received an MBA from Santa Clara University.