Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Enable Logging: Secure Cloud-native Development Series

Build secure cloud-native applications by avoiding the top five security pitfalls we lay out in our Secure Cloud-native Development Series. This blog is the second part of the series, and it will teach you how and why to enable logging from the start. We’re going to talk about enabling logging (cloud logging, to be specific). What’s the difference? Not much, other than the fact that it’s another managed service integrated with the tools we should already be utilizing.

The Role of Software in Vendor Risk Management Products

In recent years, vendor risk management (VRM) has become a complicated practice as businesses aim to scale and manage potentially hundreds or thousands of vendors. With more vendors, cybersecurity risk is introduced, necessitating software and other digital solutions to adequately manage these vendors. The role of software in vendor risk management products is more important than ever now and moving forward.

The 443 Podcast - Episode 257 - Weaponizing WinRAR

This week on the podcast we cover the latest evolutions of the North Korean threat actor Lazarus before covering an actively-exploited 0day vulnerability in the popular unarchiver WinRAR. We end the episode with an AI-related attack that doesn't actually use AI. You can view more information on the CISA guidance as well as Blaze Lab's full blog post at the links below: The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

LUKB taps Fireblocks to build infrastructure for new crypto trading and custody product

Luzerner Kantonalbank (LUKB), the leading bank in the Swiss canton of Lucerne, uses Fireblocks to provide the infrastructure for this new digital asset initiative. Read the blog and watch the video. In an era where digital assets are reshaping the landscape of financial services, Luzerner Kantonalbank (LUKB), the leading bank in the Swiss canton of Lucerne, is at the forefront of innovation.

TMX Finance Suffers a Breach Exposing Nearly 5 Million

TMX Finance and related companies are all involved in crisis loans and emergency lending programs. The companies handle financial data for a huge number of individuals throughout the United States, and the different individuals involved with the company could be at risk for this reason. We recently learned that TMX Finance suffered from a data breach that exposed data for nearly 5 million people. News of the breach was just released, but victims may have been exposed for months now.

The Hacker and The Fed: Combatting Cybercrime from the Inside

You’ve heard of Anonymous. This is one of the most talked about and dangerous cybercriminal organizations in the world. Join this session to understand the perspective and experience of former Anonymous Black Hat Hacker, Hector Monsegur, and the former FBI agent who infiltrated Anonymous, Chris Tarbell.

Why Cybersecurity Is So Valuable for Small Businesses

Cybersecurity is extremely valuable for small businesses because it keeps their data secure, improves employee productivity, helps protect their reputation, aids in legal and regulatory compliance, and is cost-effective. Read on to learn more about the value of cybersecurity for small businesses and cybersecurity best practices your business can start implementing today.

The Case for Single-Tenant SaaS for IGA

More and more organizations are moving towards a cloud-first strategy where they look to move their on-premises applications to SaaS offerings. This is especially true for customers looking to streamline their on-premises Identity Governance and Administration (IGA) application via a move to the Cloud.

NACL best practices: How to combine security groups with network ACLs effectively

Like all modern cloud providers, Amazon adopts the shared responsibility model for cloud security. Amazon guarantees secure infrastructure for Amazon Web Services, while AWS users are responsible for maintaining secure configurations. That requires using multiple AWS services and tools to manage traffic.

Host-based firewalls vs. network-based firewalls for network security?

Before your organization can move business applications to the cloud, it must deploy network security solutions that can reliably block cybercrime and malware. Firewalls are essential cybersecurity tools that protect network traffic against threat actors. There are many different types of firewalls available, but put the same basic principles in action.