The API Security Crisis: Why Your Company Could Be Next

August 7, 2024 at 10:08AM API security is a critical concern as companies face evolving and increasingly dangerous threats. The rapid proliferation of poorly secured APIs makes organizations vulnerable to significant breaches. To address this, companies must catalog their APIs, adopt a zero-trust approach, and implement robust security measures, as well as prioritize ongoing monitoring … Read more

Implementing Identity Continuity With the NIST Cybersecurity Framework

August 2, 2024 at 10:03AM In the modern enterprise, identity plays a critical role similar to electricity in business continuity, especially with cloud-based IDPs. Implementing a robust identity continuity plan, aligned with the NIST Cybersecurity Framework, involves inventorying applications and identities, ensuring continuous identity operations, monitoring, responding to outages, managing incidents, and continuous policy management. … Read more

Unprecedented: Cloud Giants, Feds Team on Unified Security Intelligence

July 12, 2024 at 02:34PM The top US cloud service providers are collaborating on a National Cyber Feed Initiative to provide real-time threat-monitoring data to federal cybersecurity authorities. The effort aims to improve threat intelligence sharing and cybersecurity. Challenges remain, including standardizing data delivery and making the information consumable. The initiative has gained momentum and … Read more

CISA Releases Guidance on Network Access, VPNs

June 27, 2024 at 11:50AM The Cybersecurity and Infrastructure Security Agency, in collaboration with the FBI and New Zealand organizations, released guidance on modern network access security, emphasizing modern firewall and network access management technologies. It focuses on three approaches: zero trust, secure service edge, and secure access service edge. Recommended practices include continuous monitoring, … Read more

Improving cyber defense with open source SIEM and XDR

May 15, 2024 at 01:16PM A cyber defense strategy is crucial for preventing, detecting, and responding to cyber attacks, mitigating financial loss, reputational damage, and legal repercussions. It involves risk assessment, technology selection, integration, incident response planning, continuous monitoring, and user awareness. Integrating Wazuh, a free, open source security solution, enhances threat detection, incident response, … Read more

The Cybersecurity Checklist That Could Save Your M&A Deal

May 1, 2024 at 10:05AM Mergers and acquisitions (M&A) are on the rise globally, with M&As in the US up 130% to $288 billion, and 56% globally to $453 billion. The exchange of sensitive data during M&As creates cybersecurity challenges, making cybersecurity critical for protecting confidential data and maintaining customer trust. A detailed cybersecurity checklist … Read more

How Do We Integrate LLMs Security Into Application Development?

April 5, 2024 at 03:39PM Language model security is paramount as businesses incorporate large language models (LLMs) like GPT-3. Their remarkable efficiency poses unprecedented security challenges such as prompt injection attacks, insecure output handling, and training data poisoning, necessitating novel protective measures like input sanitization, output scrutiny, safeguarding training data, and enforcing strict sandboxing and … Read more

PoC Exploits Heighten Risks Around Critical New Jenkins Vuln

January 29, 2024 at 05:05PM Around 45,000 Internet-exposed Jenkins servers remain unpatched against a critical arbitrary file-read vulnerability (CVE-2024-23897), allowing remote code execution. Proof-of-exploit code is available, with reports of attackers attempting to exploit. The vulnerability affects the Jenkins CLI and can lead to data theft, system compromise, and disrupted pipelines. An immediate software update … Read more

Attackers Abuse Google OAuth Endpoint to Hijack User Sessions

January 3, 2024 at 06:08AM Prisma uncovered a critical exploit within an undocumented Google OAuth endpoint, enabling attackers to hijack user sessions and maintain continuous unauthorized access to Google services. The exploit has been integrated into various malware and has continued to evolve, posing a significant threat. CloudSEK has emphasized the need for enhanced cybersecurity … Read more

Communicating with Impact: Tips for Discussing Cybersecurity Metrics with Boards

December 14, 2023 at 02:06PM CISOs are tasked with evaluating and reporting on cybersecurity’s impact on the business. They need to identify relevant metrics that provide insight into risk management, threat landscape, and control effectiveness. Presenting cybersecurity metrics in the context of business risk and aligning them with emerging risks and regulatory changes is crucial … Read more