Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

5 Insights to Planning for a More Cybersecure World

SecurityScorecard recently joined the World Economic Forum’s Centre for Cybersecurity and UC Berkeley’s Center for Long-Term Cybersecurity (CLTC) for a private, invite-only workshop in Washington, DC alongside global leaders, CEOs, and CISOs to identify trends and insights that will most likely impact cybersecurity in the next decade of 2030 via future-focused scenarios with emerging cybersecurity challenges.

CodeSecDays brings security leaders together to build a world without software security issues

In GitGuardian's first digital conference, CodeSecDays, security leaders from multiple leading companies like Snyk, Chainguard, Doppler, RedMonk, and more came together to share the latest in code and application security.

The 443 Podcast - Episode 251 - Red Teaming AI Systems

This week on the podcast, we give an update on last week's discussion around a China-based APT targeting government organizations. After that, we cover the latest uses of generative AI like ChatGPT by malicious hackers. Finally, we end with a report from Google on their efforts around Red Teaming Artificial Intelligence systems.

Webinar: Top Security Threats Worldwide Q1 2023

Join WatchGuard CSO Corey Nachreiner and Director of Security Operations Marc Laliberte as they discuss key findings from the WatchGuard Threat Lab’s Q1 2023 Internet Security Report. They’ll cover the latest malware and network attack trends targeting small and midsized enterprises and defensive tips you can take back to your organization to stay ahead of modern threat actor tactics.

AWS Identity Center (SSO) vs. AWS Identity Federation vs. AWS IAM

Selecting an identity management solution is a critically important decision for any software organization. Identity management is a foundational component of good cloud security and can either be an enabler for scalability or a huge technical debt sink. Many organizations start with AWS by quickly throwing together their IAM infrastructure: some users, a few roles, and some policies.

Immutable vs. Mutable Backups: Does it Really Matter?

As the fight against ransomware continues, the value of data cannot be understated. Considering what a breach could cost and how long it would take to rectify, it’s no wonder risk mitigation and response is at the forefront of every IT leader’s mind. When discussing data storage, data permanence is often discussed as a way to retain information indefinitely. But when it comes to the threat of ransomware, does the immutability of your backups play such an important role?

Cyber Security Behaviours: Bridging the Gap Between Awareness and Action

Awareness of potential threats is merely the first step; true change is brought about when secure practices become habitual through consistent reinforcement. The focus on cyber security behaviours is pivotal, as it converts theoretical knowledge into routine action. This ensures that employees not only understand the nuances of the threat landscape but also possess the capability to respond effectively during a genuine cyber attack.

Electrifying Exploit: A Case Study on SSRF Vulnerability in an EV Manufacturer's System

You're cruising down the highway in your sleek, state-of-the-art electric vehicle (EV). The hum of the electric motor is your soundtrack, the open road your cinema. Your dashboard, a symphony of lights and numbers, is a live feed of your vehicle's vitals – battery levels, tire pressure, energy consumption, and more. Suddenly, your phone buzzes. It's your EV's companion app, alerting you to an unexpected battery drain.

8 Essential Cybersecurity Tips for Protecting Your Online Identity

In the era of the internet, our online identities often carry as much weight as our physical ones. Everything from banking and shopping to socializing and working is now done online, making our digital identity a tempting target for cybercriminals. It's more important than ever to take proactive steps to protect your online identity from these threats. In this article, we'll outline seven essential cybersecurity tips you can adopt to keep your digital persona safe.