Top 5 Mistakes Businesses Make When Implementing Zero Trust

July 17, 2024 at 04:40PM The press release highlights the growing trend of organizations adopting Zero Trust architectures in response to evolving cybersecurity threats. It emphasizes the challenges and common mistakes organizations face when implementing these strategies, such as overlooking organizational culture, underestimating human risk, neglecting the supply chain, failing to plan for sustainable success, … Read more

Orgs Are Finally Making Moves to Mitigate GenAI Risks

July 17, 2024 at 12:08PM Enterprise security teams are increasingly addressing the risks associated with the use of AI-enabled applications. An analysis by Netskope found that organizations are implementing controls such as blocking policies and data loss prevention tools to protect against the sending of sensitive data to AI apps. The focus is now shifting … Read more

Navigating Insider Risks: Are your Employees Enabling External Threats?

July 17, 2024 at 07:18AM The text outlines the threat posed by accidental insiders in cybersecurity. It discusses how employees, through lack of awareness or pressure to perform, can compromise security. The text highlights the potential consequences of such breaches and proposes proactive measures to mitigate the risk, emphasizing the importance of training, organizational controls, … Read more

Trade the Comfort of Security Theater for True Security

July 11, 2024 at 03:13PM The text discusses the concept of “security theater,” where companies prioritize the appearance of security over actual risk mitigation. It outlines the various actors involved in creating this illusion and warns about the legal and financial consequences. The importance of true security, evolving with technology and enforcing a growth mindset, … Read more

CISA Takedown of Ivanti Systems Is a Wake-up Call

July 9, 2024 at 10:03AM The cyberattack on Ivanti’s asset management software has prompted action from CISA and raises questions about exploit techniques, breach response, and downtime costs. Attackers bypassed authentication and gained unauthorized access, prompting CISA to intervene and take Ivanti’s systems offline. The incident emphasizes the importance of robust cybersecurity measures and proactive … Read more

What Building Application Security Into Shadow IT Looks Like

June 24, 2024 at 03:02PM Application security programs are often challenging, with overloaded staff and communication issues. Despite these hurdles, a team successfully resolved 70,000 out of 80,000 security vulnerabilities in three months. Citizen developers are pervasive in enterprises, creating unique security challenges. A successful AppSec program for citizen developers requires automation, self-service, and adherence … Read more

Third-Party Cyber Attacks: The Threat No One Sees Coming – Here’s How to Stop Them

June 6, 2024 at 08:30AM Cybersixgill’s threat experts shed light on the critical threats posed by supply chain attacks, targeting organizations’ third-party vendors and suppliers. These attacks provide unauthorized access to sensitive information, resulting in financial losses, data breaches, and operational disruptions. With an increasing number of cybercriminals targeting the supply chain, it is essential … Read more

Delta Electronics CNCSoft-G2 DOPSoft DPAX

April 30, 2024 at 10:47AM Summary: The vulnerability report concerns Delta Electronics’ CNCSoft-G2 software, where a stack-based buffer overflow could lead to arbitrary code execution. Versions 2.0.0.5 and prior are affected. The report includes mitigation measures, a risk evaluation, affected products, technical details, and background information. CVE-2024-4192 has been assigned to this vulnerability. From the … Read more

Zafran Emerges From Stealth With Risk and Mitigation Platform, $30M in Funding

March 28, 2024 at 09:12AM Israeli cybersecurity company Zafran emerged from stealth mode, unveiling its $30 million funding and a risk mitigation platform. Founded in 2022 by Sanaz Yashar, Ben Seri, and Snir Havdala, the firm’s platform leverages security tools to address vulnerabilities. Their industry-first mitigation knowledgebase works with endpoint detection, firewall, and cloud products. … Read more

Getting Security Remediation on the Boardroom Agenda

March 27, 2024 at 09:25AM IT teams can improve their resilience to scrutiny by educating their board on risks, their mitigation, and their long-term strategy for risk management. Based on the meeting notes, the key takeaways are that the IT teams need to improve their ability to handle scrutiny by guiding the board in understanding … Read more