Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Importance of Cybersecurity Standards and Certifications for SMBs

In today’s world with cyber attacks hitting the headlines daily, cybersecurity is at the forefront of many business owners’ minds, but implementing the right solutions and knowing what to do to reduce your risk is a big challenge for decision makers in these organizations. The task is even harder for small- to medium-sized businesses (SMB) that tend to lack extensive budgets and resources needed for implementing the most effective and high-brow cybersecurity solutions on the market.

3 Takeaways From the 2021 Egnyte for Life Sciences Summit

The 2021 Egnyte for Life Sciences Summit is in the books, and it was a big success. Biotech visionaries and industry analysts came together to outline the future of the life sciences as we emerge from the pandemic constraints and look to ramp up to our new normal. We presented over four hours of content, with hundreds of life science organizations attending.

5 priorities for CISOs to regain much needed balance in 2022

Here’s what security leaders need to do in the face of rising stress levels and cyberattacks Nearly 9 out of 10 CISOs say their existing systems secured their enterprise through a shift to remote work, an ongoing labor shortage, and a huge spike in cybersecurity attacks. But that success came with a price: 64% say they’re more stressed out than they were a year ago. How can CISOs navigate a new set of challenges in 2022, while also regaining some much needed balance?

95% of MSPs acknowledge that using different interfaces to manage cybersecurity reduces productivity

Managing customer security is always a challenge for MSPs as they seek to balance efficiency, cost, and high levels of protection. In this area, security managers are faced with the choice of using a single interface or switching between different solutions.

Shame and Cybersecurity: Creating a Safe Space in Your Organization

“Say ‘Ta,’” said Mamma Bear. “Ta,” said Baby Bear. He then dropped the mug of blackcurrant juice by accident. “What have you done?” exclaimed Daddy Bear. “The carpet is RUINED!!” Baby Bear felt a great sense of something disturbing, and this wasn’t a thousand voices suddenly being silenced. This was much deeper. This hurt, and Daddy Bear’s face was angry, disappointed. He was panicking about some purple stuff on the carpet.

Meet a Hacker Hero - Eva Galperin

When we asked the security community who is their hacker hero, it was unsurprising to see that Eva Galperin, Director of Cybersecurity at EFF and co-founder of the Coalition Against Stalkerware was a finalist on the list. Galperin is a hacktivist known for her rage tweets that help her fight the good fight to protect vulnerable groups being targeted. Most known for her work to track down APTs, she also champions personal privacy and taking down stalkerware. Oh and she’s done a TED talk.

How to mitigate kubelet's CVE-2021-25741: Symlink exchange can allow host filesystem access

CVE-2021-25741 is a new vulnerability discovered in Kubernetes that allows users to create a container with subpath volume mounts to access files & directories outside of the volume, including the host filesystem. It was disclosed in September 2021 and affects kubelet, which is the node agent that runs on each Kubernetes node. In particular CVE-2021-25741 affects kubelet in these Kubernetes versions.

Weekly Cyber Security News 24/09/2021

A selection of this week’s more interesting vulnerability disclosures and cyber security news. For a daily selection see our twitter feed at #ionCube24. Complex features require a little more care and understanding. If unsure I would advise disabling them and looking at the documentation – that is assuming such features have correct documentation!.