Cyral Wins Gold for Second Year in a Row with the Cybersecurity Excellence Awards

|
I’m excited to announce that for the second year in a row, Cyral and Cyral’s cloud-native enterprise data security and governance platform have been recognized … The post Cyral Wins Gold for Second Year in a Row with the Cybersecurity Excellence Awards appeared first on Cyral ... Read More
The Security Digest: 86

The Security Digest: 86

|
Time to get busy with your updates! It’s “Patch Tuesday” and Microsoft released a hefty set of patches. With federal agencies being attacked on a … The post The Security Digest: 86 appeared first on Cyral ... Read More
Credential Stuffing Attack Demo - How to Prevent Them While Maintaining Risk and Trust

Managing ATOs When Online Engagement Is at a Peak [video blog]

| | Industry
See a live demo of two different credential stuffing attacks and learn how to prevent potential ATOs while maintaining a balance between trust, risk, and user experience ... Read More
Bad Bots vs SEO: Where Security and Marketing Collide

Bad Bots vs SEO: Where Security and Marketing Collide

| | Industry
While bad bots are usually a top priority for security teams, when they start interfering with SEO, they become a priority for marketing teams as well. Learn more in our latest blog ... Read More

Brute Force Attacks: Denying the Attacker, Not the User

According to haveIbeenpwned.com, close to 8 billion accounts have been compromised. The site provides a tool to see if any of your passwords have been compromised and are available on the dark-net. Once passwords are compromised, they are easily exposed to bad actors who can use them for brute force ... Read More

How to Thwart an Attacker’s Attempt to Compromise Credentials and Move Around a Network

In the past year, we have seen numerous publicly traded corporations (Marriott and T-Mobile), airlines (Cathay Pacific and Delta), and tech companies (Facebook and Google+) all breached because of some type of insider threat or compromised credentials. So, it’s no surprise that insider threats and preventing credential compromise are growing ... Read More

Conditional Access Establishes Trust In the Network

Stolen or compromised credentials pose well-known risks to organizations and their employees. And as hackers and other malicious actors become more advanced and sophisticated in their techniques, the global threat is increasing. At a recent IT security conference, I spoke with a customer about an alert (TA18-276A) that the United ... Read More

You Failed Your Pen Test: How Can You Reduce Your Attack Surface?

|
Penetration testing is a critical best practice for virtually any organization’s cybersecurity posture. By putting defenses to the test against trained offensively-minded professionals, organizations can gain deep insights into how they’ll fare against real attackers. Often, the challenge is that the results are not what you would have hoped. When ... Read More

Cybersecurity is Increasingly Important for M&A Dealmakers

|
Corporate boards widely recognize due diligence as a critically important component of the M&A process, particularly when it comes to vetting financial numbers and legal obligations. The stakes are enormous: The value of worldwide mergers and acquisitions totaled $3.6 trillion in 2017, according to Thomson Reuters. Globally, M&A activity is ... Read More

Is a Fragmented View of Users Increasing Your Risk of Breach?

|
Last week, I was on the road speaking with CISOs across the country. One theme emerged loud and clear: Virtually all of the organizations have invested a lot in security tools and solutions, but despite their investment, they struggle with getting a complete view of user access across platforms. So, ... Read More