Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

State of Maine Information Stolen via MOVEit: Nearly All Residents at Risk

Maine hosts over 1.3 million people within a granite and forest landscape. The state government employs under 100,000 individuals but does not contain fewer departments than more populous states like California. Maine’s state departments coordinate with each other by using backend file transfer systems; a globally utilized file transfer tool, Progress Software’s MOVEit application, has put nearly all Maine resident information at risk.

Why the Insurance Industry is a Prime Target for Cybercrime

Insurance companies, like other financial institutions, face a range of unique cybersecurity challenges and considerations. Responsible for safeguarding treasure troves of sensitive data, the industry has long been a prime target for cybercrime — a trend that has endured even as today’s IT landscape, and the threats against it, continue to evolve.

Introducing Private Links: A faster, easier way to gather vendor security information

When it comes to conducting vendor security reviews, the two most time-consuming tasks are gathering the relevant information from your vendor and analyzing it thoroughly. Last month, we announced AI-powered security document analysis to drastically simplify the process of extracting insights from SOC 2 reports, DPAs, and other sources that document a vendor’s security posture.

UK Phishing Report: Attacks Are on the Rise

The data about the rise of phishing attacks against businesses in the United Kingdom is in, and it’s bleak: UK phishing reports indicate that 79 percent of organizations in the UK were targeted by phishing attacks in the past year. Meanwhile, phishing is the initial attack vector in 36 percent of all data breaches globally, according to Verizon’s 2023 Data Breach Investigations Report. And 80,000 new phishing sites appear every month, according to Cyberint research.

The 443 Podcast - Episode 268 - Combined Cyber and Kinetic Warfare

This week on the podcast, we cover an analysis from Mandiant on an attack lead by the Russian state-sponsored threat actor Sandworm that came alongside missiles strikes against Ukraine. Before that, we review Okta's post mortum from their recent cyber incident. We end the episode by discussing udpated research from Jamf on a North Korean threat actor targeting the financial sector. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

How CISO's Should Approach Security Vulnerability Risk

Patrick Garrity, Security Researcher at Nucleus Security, interviews Aleksandr Yompolski, CEO of Security Scorecard, about the evolving cybersecurity landscape and the role of security ratings and risk assessments. They discuss the challenges organizations face in defending against exploitation attacks, the need for collaboration and communication in the industry, and the importance of balancing security and business agility.

A Comprehensive Comparison of Cyber Essentials vs Cyber Essentials PLUS

Protecting sensitive data and maintaining customer trust is paramount, and demonstrating your data security commitment is equally important. One way to achieve this is by obtaining a Cyber Essentials certification. But what are the differences between “cyber essentials vs cyber essentials plus”, and how do they impact your organisation’s cybersecurity strategy?

Unlock the path to Cyber Essentials Plus Certification

Organisations must ensure their defences are robust enough to withstand attacks and demonstrate these to their customers, supply chain and staff. This is where Cyber Essentials Plus certification comes in – a government-backed scheme that helps organisations bolster their security posture and protect against common cyber attacks.