Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cyber Security Risk Modeling: What Is It And How Does It Benefit Your Organization?

As cyber security threats proliferate, cyber risk conversations are no longer limited to the Security Operations Center (SOC); they command the attention of the C-suite and the boardroom. Ultimately, cyber-crime is a significant and prominent issue. The average cost of a data breach in the U.S. has soared to nearly $9.44 million this year. Since 2018, cyber insurance carriers report that incident-related claims increased by an astonishing 486%, the majority being ransomware-related.

Unlocking efficiency: a strategic approach to handling Kubernetes security findings

Kubernetes has emerged as the de facto standard for container orchestration, enabling organizations to manage and scale their applications efficiently. However, with this increased adoption comes the need to address security concerns within Kubernetes environments. The following blog post will explore the concept of ignoring security findings as a means of prioritizing fixes effectively.

IIS 10 CIS Benchmark Audit Procedure using PowerShell

CIS IIS 10 Benchmark provides prescriptive guidance for establishing a secure configuration posture for Microsoft Internet Information Services (IIS) version 10. The benchmark provides guidance for establishing a secure configuration posture for IIS version 10. The benchmark is divided into two levels of security controls: Level 1 and Level 2. Level 1 provides a set of fundamental security measures that can be implemented with little or no impact on service availability.

[HEADS UP] See WormGPT, the new "ethics-free" Cyber Crime attack tool

CyberWire wrote: "Researchers at SlashNext describe a generative AI cybercrime tool called “WormGPT,” which is being advertised on underground forums as “a blackhat alternative to GPT models, designed specifically for malicious activities.” The tool can generate output that legitimate AI models try to prevent, such as malware code or phishing templates.

The 443 Podcast - Episode 250 - New Microsoft Office 0-Day

This week on the podcast we cover two stories that came out of Microsoft's July Patch Tuesday. The first involves an incident within Microsoft that lead to foreign cybercriminals compromising the email accounts of multiple government agencies. The second story involves an actively exploited 0-day vulnerability in Office that at the time of recording, remains unpatched.

AI at Egnyte: The First Ten Years

In the 1960s, Theodore Levitt published his now famous treatise in the Harvard Business Review in which he warned CEOs of being “product oriented instead of customer oriented.” Among the many examples cited was the buggy whip industry. As Levitt wrote, “had the industry defined itself as being in the transportation business rather than in the buggy whip business, it might have survived. It would have done what survival always entails — that is, change.”

The power of self-service and just-in-time access in PAM

The concept of privileged access management (PAM) has evolved over time, starting with the idea of role-based access control (RBAC) where permissions are assigned based on job roles. However, organizations soon realized that defining concrete roles for individuals was challenging due to the flexible and evolving nature of businesses. This led to the need for automating the access request process and empowering employees to self-serve and elevate their access based on their needs.