Bitsight to Acquire Cybersixgill for $115 Million

November 14, 2024 at 11:32AM Cyber risk management firm Bitsight has announced its acquisition of threat intelligence provider Cybersixgill for $115 million. This deal will enhance Bitsight’s capabilities in risk management and threat detection, providing organizations with comprehensive insights into their attack surfaces and bolstering their cybersecurity measures with real-time, AI-driven data. ### Meeting Takeaways: … Read more

Ivanti Patches 50 Vulnerabilities Across Several Products

November 13, 2024 at 08:03AM Ivanti has addressed numerous vulnerabilities by releasing fixes for Endpoint Manager, Avalanche, Connect Secure, Policy Secure, and Secure Access Client, enhancing security across these products. **Meeting Takeaways:** 1. **Release of Fixes:** Ivanti has issued fixes addressing multiple vulnerabilities. 2. **Affected Products:** The vulnerabilities were found in the following products: – … Read more

Comprehensive Guide to Building a Strong Browser Security Program

November 13, 2024 at 07:15AM The rise of SaaS and cloud environments has increased cybersecurity threats, particularly through browsers. LayerX released a guide, “Kickstarting Your Browser Security Program,” outlining steps for implementing browser security, including threat mapping, stakeholder collaboration, and gradual rollouts. Successful programs adapt to evolving risks, focusing on data protection and credential safety. … Read more

HPE Issues Critical Security Patches for Aruba Access Point Vulnerabilities

November 11, 2024 at 05:39AM Hewlett Packard Enterprise (HPE) released security updates for Aruba Networking Access Point products, addressing critical command injection vulnerabilities (CVE-2024-42509, CVE-2024-47460) that allow unauthenticated remote code execution. Users are advised to enable cluster security or block access to UDP port 8211 and implement management access controls to mitigate risks. **Meeting Takeaways: … Read more

4 Main API Security Risks Organizations Need to Address

November 4, 2024 at 08:29AM API security vulnerabilities have significantly increased, with a 21% rise in flaws reported. Key issues include misconfigured APIs, poor design, inadequate security testing, and lack of visibility. Organizations must implement strict authorization checks, consistent testing, and governance frameworks to mitigate risks and protect against breaches and attacks. ### Meeting Takeaways … Read more

OPA for Windows Vulnerability Exposes NTLM Hashes

October 22, 2024 at 05:31PM Organizations using Open Policy Agent (OPA) for Windows should update to v0.68.0 or later to address a vulnerability (CVE-2024-8260) that exposes user credentials via improper input validation. This flaw allows attackers to exploit authentication processes, highlighting the risks linked to using open-source software. ### Meeting Takeaways: 1. **Update Recommendation**: – … Read more

A Comprehensive Guide to Finding Service Accounts in Active Directory

October 22, 2024 at 07:30AM Service accounts in Active Directory are essential yet pose security risks due to their elevated privileges if unmanaged. This guide details methods for locating and securing these accounts, highlighting Silverfort’s automated solutions for discovery, monitoring, and access protection, ultimately enhancing an organization’s security posture against potential breaches. ### Meeting Takeaways: … Read more

Is a CPO Still a CPO? The Evolving Role of Privacy Leadership

October 17, 2024 at 10:06AM The role of the Chief Privacy Officer (CPO) is evolving amidst increasing data breaches and regulatory demands. CPOs now juggle diverse responsibilities, integrating privacy with security and AI governance. Effective data management requires collaboration across teams, emphasizing the need for a robust privacy framework that enhances overall organizational resilience. ### … Read more

LLMs Are a New Type of Insider Adversary

October 15, 2024 at 10:01AM Security teams recognize large language models (LLMs) as essential business tools, but their manipulation risks call for heightened caution. Vulnerabilities can lead to unauthorized actions, exposing sensitive data and causing significant breaches. Enterprises must adopt a proactive “assume breach” mindset, implementing strict access controls, data sanitization, and sandboxing to mitigate … Read more

The Invisible Army of Non-Human Identities

October 11, 2024 at 10:07AM Non-human identities (NHIs) have significantly increased in cybersecurity, posing risks as potential entry points for attackers. With far more NHIs than human users, visibility and privilege sprawl are major challenges. To mitigate these risks, organizations must enhance discovery, inventory, and management practices, prioritizing NHI security alongside traditional measures. ### Meeting … Read more