GUEST ESSAY: The case for an identity-first approach ‘Zero Trust’ privileged access management

GUEST ESSAY: The case for an identity-first approach ‘Zero Trust’ privileged access management

Today’s enterprises are facing more complexities and challenges than ever before. Related: Replacing VPNs with ZTNA Thanks to the emergence of today’s hybrid and multi-cloud environments and factors like remote work, ransomware attacks continue to permeate each industry. In fact, … (more…) ... Read More
GUEST ESSAY: The rise of ‘PhaaS’ — and a roadmap to mitigate ‘Phishing-as-a-Service’

GUEST ESSAY: The rise of ‘PhaaS’ — and a roadmap to mitigate ‘Phishing-as-a-Service’

Cybersecurity is a top concern for individuals and businesses in the increasingly digital world. Billion-dollar corporations, small mom-and-pop shops and average consumers could fall victim to a cyberattack. Related: Utilizing humans as security sensors Phishing is one of the most … (more…) ... Read More
SHARED INTEL: Poll highlights the urgency to balance digital resiliency, cybersecurity

SHARED INTEL: Poll highlights the urgency to balance digital resiliency, cybersecurity

The pace and extent of digital transformation that global enterprise organizations have undergone cannot be overstated. Related: The criticality of ‘attack surface management’ Massive global macro-economic shifts have fundamentally changed the way companies operate. Remote work already had an impact … (more…) ... Read More
How MSSPs can help companies meet 'CMMC' cybersecurity benchmarks by Byron Acohido

SHARED INTEL: The cybersecurity sea change coming with the implementation of ‘CMMC’

Finally, Uncle Sam is compelling companies to take cybersecurity seriously. Related: How the Middle East paved the way to CMMC Cybersecurity Maturity Model Certification version 2.0 could  take effect as early as May 2023 mandating detailed audits of the cybersecurity … (more…) ... Read More
GUEST ESSAY: The drivers behind persistent ransomware — and defense tactics to deploy

GUEST ESSAY: The drivers behind persistent ransomware — and defense tactics to deploy

The internet has drawn comparisons to the Wild West, making ransomware the digital incarnation of a hold-up. Related: It’s all about ‘attack surface management‘ However, today’s perpetrator isn’t standing in front of you brandishing a weapon. They could … (more…) ... Read More
NEW TECH SNAPSHOT: The role of ‘MSSPs’ in helping businesses manage cybersecurity

NEW TECH SNAPSHOT: The role of ‘MSSPs’ in helping businesses manage cybersecurity

Network security has been radically altered, two-plus years into the global pandemic. Related: ‘Attack surface management’ rises to the fore The new normal CISOs face today is something of a nightmare. They must take into account a widely scattered … (more…) ... Read More
Taking a wartime approach to defending networks. by Byron Acohido

Black Hat Fireside Chat: Taking the fight to the adversaries — with continuous, proactive ‘pen tests’

Penetration testing – pen tests – traditionally have been something companies might do once or twice a year. Related: Cyber espionage is on the rise Bad news is always anticipated. That’s the whole point. The pen tester’s assignment is … (more…) ... Read More
GUEST ESSAY: Stolen logons, brute force hacking get used the most to breach web, email servers

GUEST ESSAY: Stolen logons, brute force hacking get used the most to breach web, email servers

Web application attacks directed at organizations’ web and mail servers continue to take the lead in cybersecurity incidents. Related: Damage caused by ‘business logic’ hacking This is according to Verizon’s latest 2022 Data Breach Investigations Report (DBIR). In … (more…) ... Read More
Addressing the yin and yang of APIs by Byron Acohido

Black Hat Fireside Chat: Doing deep-dive API security — as software gets developed and deployed

APIs have come to embody the yin and yang of our digital lives. Related: Biden moves to protect water facilities Without application programming interface, all the cool digital services we take for granted would not be possible. But it’s also … (more…) ... Read More
GUEST ESSAY: A breakdown of the cyber risks intrinsic to ubiquitous social media apps

GUEST ESSAY: A breakdown of the cyber risks intrinsic to ubiquitous social media apps

More than half of the world—58.4 percent or 4.62 billion people—use social media. Related: Deploying human sensors to stop phishing. And while that’s incredible for staying connected with friends, organizing rallies, and sharing important messages, it’s also the reason … (more…) ... Read More