Vulnerabilities
6 Keys to Asset Protection for High-Net-Worth Individuals
Cybercriminals are using new and inventive strategies to target the personal assets of high-net-worth individuals. In the modern age, criminals can appropriate your assets and disrupt your personal privacy without ever stepping ...
New National Cybersecurity Strategy Will Require Compliance, Collaboration
The Biden administration’s recently released National Cybersecurity Strategy goes beyond the executive order it issued in 2021, which defined security measures any organization doing business with the federal government must follow. As ...
5 Ways to Reduce the Attack Surface for Microservices
Microservices is a software development approach where an application is divided into small, independent and loosely coupled services that work together to provide the application’s overall functionality. Each microservice is designed to ...
Orca Security Traces Cloud Vulnerabilities Back to Code
Orca Security today announced it added an ability to trace cloud security risks in production environments back to both the original code that created the issue and the developer that wrote it ...
Splunk: Cybersecurity Dynamics Rapidly Changing
A survey of 1,520 cybersecurity and IT leaders published today found more than half (52%) reporting their organization suffered a data breach in the past two years, with 62% experiencing monthly unplanned ...
Sysdig Details Proxyjacking Attack Leveraging Log4j Vulnerability
Sysdig today published a report that described how cybercriminals are exploiting the Log4j vulnerability to gain access to IP addresses that are then sold to entities that resell them. Dubbed proxyjacking, the ...
What the TikTok Ban Could Mean for GRC
The White House and TikTok’s critics in Congress have made it clear: They consider TikTok a dangerous social media app and national security threat. Throughout the March 23, 2023, congressional hearing, TikTok ...
Beyond SolarWinds: 6 More Notable Software Supply Chain Attacks
SolarWinds has become almost a household name and for all the wrong reasons: beginning in 2019, the system management company was the target of one of the largest software supply chain attacks ...
Western Digital Hacked: ‘My Cloud’ Data Dead (Even Local Storage!)
Déjà Vu: Hack of WD systems leads to My Cloud service outage. Owners unable to access files ...
Passkeys and Biometrics Can Thwart Bad Actors
Cybersecurity breaches are a constant threat, and it’s only getting worse. In 2021, 45% of US companies suffered data breaches related to compromised credentials, 42 million individuals suffered losses greater than $50 ...