Hybrid cloud computing enables organizations to deploy sensitive workloads on-premise or in a private cloud, while hosting less business-critical resources on public clouds. But despite its many benefits, the hybrid environment also creates security concerns. AlgoSec’s co-founder and CTO, Prof. Avishai Wool shares his expert insights on these concerns and offers best practices to boost hybrid cloud security.
We are proud to announce the WatchGuard Firebox M690 has been named “Next Generation Firewall Solution of the Year” in the sixth annual CyberSecurity Breakthrough Awards This prestigious awards program recognizes the world’s best information security companies, products and people.
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we’ll learn about the evolution of video conferencing since the 2020 pandemic, the security challenges faced by video conferencing tools, how companies and governments have acknowledged the risks, and the best practices to avoid such attacks.
Ransomware’s first documented attack was relatively rudimentary. It was delivered via floppy disk containing a malware program in 1989 that told its victims to pay $189 in ransom to a PO Box in Panama. Today ransomware criminals are significantly more sophisticated, thanks to advances in cyber methods and cryptocurrencies. Not all Ransomware is created equally. Like all malware, malicious codes vary in sophistication and modularity. As such, not all ransomware codes are made the same.
In what seems to be a constant drip of headlines about large enterprises experiencing security incidents, the world most recently learned of a successful data infiltration of rideshare and delivery company Uber. In a blog update, Uber attributed the attack to the infamous Lapsus$ group that has made a name for itself over the past year with successful breaches of household names including Microsoft, Rockstar Games, Samsung, Nvidia, Ubisoft, and Okta.
In the context of digital onboarding, demographic features such as ethnicity, age, gender, socioeconomic circumstances, and even camera/device quality might affect the software’s capacity to match one face to a database of faces i.e. AI Bias. The quality and resilience of the underlying database in various sorts of surveillance might feed bias in the AI models. Biometrics are used in modern face recognition software to map facial traits from an image or video.
A selection of this week’s more interesting vulnerability disclosures and cyber security news. For a daily selection see our twitter feed at #ionCube24.
All modern businesses must be prepared for a cyberattack. Cybercriminals can target your website, email network, API, or even your physical server — so is your security posture robust enough to withstand a sustained or advanced cyberattack? According to the Hiscox Cyber Readiness Report 2022, business cyber readiness scores have fallen by 2.6% over the last year. Mostly, this stems from a cybersecurity staff shortage, as well as declining governance and assurance.
As digital transformation opportunities are constantly expanding, cyber threats are becoming more dangerous day by day. And as a result of this, it’s getting increasingly harder to secure digital assets. Cybersecurity teams must constantly improve their nstrategy repertoire so that organizations do not face severe losses. Incident response strategies stand out as one of the most powerful weapons that can prevent cyber attacks.