Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How NK's Cyber Criminals Stole 3 Billion in Crypto To Fund Their Nukes

The Wall Street Journal today revealed that North Korea's hacker army managed to steal a huge amount of cryptocurrency amounting to $3 billion to finance their nuclear program. US officials have confirmed this news. These hackers have a highly sophisticated method of operating. A specific example of their actions involved using a fake job offer to trick a startup into losing over $600 million. By posing as potential employers, they social engineered someone who was hopeful for a better job.

The Global Race for AI Dominance: Challenges, Data, and the Dangers of Falling Behind

Join us as we dive into the intense race for AI dominance and the complex dynamics at play. Without global consensus, some regions have already taken a stance on AI development, while others struggle to catch up. The issue with Europe lies in the lack of cohesive action, allowing others to gain a competitive edge. While the UK government's efforts are commendable, this is a moonshot project that requires collaboration and extensive data.

Support Business Agility With Hybrid Cloud Services

Hybrid cloud takes the capabilities of the public and various private cloud options and merges them, allowing businesses to host different workloads within different environments depending on their performance, security, and resource needs. Companies leveraging a hybrid cloud strategy promote business competitiveness and agility, allowing them to respond to changes in resource demands quickly.

Infosec Growth in the Tech Industry: AI, Projects, and the Fourth Industrial Revolution

Explore the tech industry's pivotal role in driving growth in the field of information security (infosec). With numerous new projects on the horizon, including the remarkable advancements in AI, the landscape is evolving rapidly. AI, which once seemed distant, is now gaining traction with substantial investments pouring in. Governments, like the UK, are legislating grants and support for AI development, recognizing its potential alongside clean energy solutions.

Preventing Denial of Service Attacks with Rate Limiting Techniques

A Denial of Service (DoS) attack will prevent your legitimate users from accessing your API. The attack could be physical, such as unplugging network cables, but a Distributed DoS is more prominent. It involves generating a volume of user requests from various machines to overwhelm your servers. DDoS attacks can result in a loss of $50,000 of revenue due to downtime and mitigation.

What's New in the NIST CSF 2.0 Draft?

The National Institute of Standards and Technology’s (NIST) Cybersecurity Framework (CSF) is undergoing a major update. The NIST CSF is one of the most widely used frameworks to help organizations understand and manage their cybersecurity risks. The NIST CSF was released as version 1.0 in 2014, updated to version 1.1 in 2018, and will be updated to version 2.0 early next year. NIST recently released a draft of CSF version 2.0.

KeeperPam Overview

KeeperPAM was created to fully protect perimeterless and multi-cloud environments with just the features you need. Keeper's patented PAM solution enables organizations to achieve complete visibility, security, control and reporting across every privileged user on every device in your organization. The platform enables zero-trust and zero-knowledge security and compliance by unifying three integral products into one SaaS platform with limited IT staff required.