Remote Access Sprawl Strains Industrial OT Network Security

September 11, 2024 at 10:04AM The exploding demand for remote access has created a vulnerable attack surface for industrial control systems, with many using multiple inadequate remote access tools. Critical infrastructure sectors are at risk, and cyberattackers have already exploited such tools in high-profile breaches. The report emphasizes the need for better management, security standards, … Read more

Human Nature Is Causing Our Cybersecurity Problem

August 19, 2024 at 10:07AM Cyberattacks have become the biggest threat to businesses, despite significant consequences. The human tendency to procrastinate, known as temporal discounting, leads to the delay in adopting modern security practices. Governments can combat this by enforcing penalties and regulations, similar to the automotive and food safety industries. Furthermore, guidance like automatic … Read more

Microsoft Announces Mandatory MFA for Azure

August 19, 2024 at 09:43AM Microsoft is ramping up account protection in Azure with mandatory multi-factor authentication (MFA) starting in October. This move aims to enhance security and will gradually apply to all tenants. Microsoft is notifying customers in advance and offers various MFA options. The tech giant emphasizes the effectiveness of MFA in preventing … Read more

Looking to Leverage Generative AI? Prep for Success With These 4 Tips

May 28, 2024 at 09:31AM Generative artificial intelligence (GenAI) is being adopted by over 55% of organizations, yet concerns remain about secure implementation. A recent poll found five main concerns, and recommends steps to ensure safe implementation. These include implementing a Zero-Trust Security Model, adopting Cyber Hygiene Standards, establishing a Data Security and Protection Plan, … Read more

Achieve security compliance with Wazuh File Integrity Monitoring

May 22, 2024 at 02:04PM File Integrity Monitoring (FIM) is a critical IT security control that audits file changes and system configurations to ensure data integrity. Compliance with cybersecurity standards is essential for mitigating risks and protecting an organization’s reputation. Wazuh’s FIM capability helps meet these standards by monitoring and detecting unauthorized file changes, thus … Read more

UK lays down fresh legislation banning crummy default device passwords

April 29, 2024 at 07:53AM The UK’s PSTI Act 2022 introduces strict regulations on smart device manufacturers to enhance security and combat cybercrime. It emphasizes minimum security standards, forbids easily discoverable default passwords, and mandates providing a contact for security concerns. However, experts argue that it falls short compared to EU standards. Non-compliance may result … Read more

Implementing container security best practices using Wazuh

April 9, 2024 at 11:37AM Containerization has revolutionized application deployment and management, emphasizing security compliance in containerized environments. Wazuh, a free open-source security platform, addresses this need by providing visibility, granular access controls, vulnerability scanning, and monitoring for Docker and Kubernetes containers. It aids in maintaining regulatory compliance and strengthening container security, making it an … Read more

How Do We Integrate LLMs Security Into Application Development?

April 5, 2024 at 03:39PM Language model security is paramount as businesses incorporate large language models (LLMs) like GPT-3. Their remarkable efficiency poses unprecedented security challenges such as prompt injection attacks, insecure output handling, and training data poisoning, necessitating novel protective measures like input sanitization, output scrutiny, safeguarding training data, and enforcing strict sandboxing and … Read more

FCC Approves Voluntary Cyber Trust Labels for Consumer IoT Products

March 14, 2024 at 04:35PM IoT device manufacturers must understand the requirements to obtain a government cybersecurity approval stamp. Based on the meeting notes, the key takeaway for IoT device manufacturers is to understand the requirements and criteria necessary to earn a cybersecurity stamp of approval from the government. This indicates that the manufacturers should … Read more

Critical ChatGPT Plugin Vulnerabilities Expose Sensitive Data

March 13, 2024 at 08:07AM Security researchers at Salt Labs discovered three critical vulnerabilities in the ChatGPT extension, potentially exposing users’ accounts and services to unauthorized access. The first vulnerability occurs during plugin installation, allowing malicious code approval. The second vulnerability lacks proper user authentication, enabling account takeovers. The third vulnerability allows for OAuth redirection … Read more