USENIX Security ’23 – Fourteen Years in the Life: A Root Server’s Perspective on DNS Resolver Security
Authors/Presenters: *Alden Hilton, Casey Deccio, Jacob Davis,* Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel...
CIS Compliance Best Practices and Advice
A simple guide to CIS compliance for enterprise security teams CIS compliance is a critical benchmark for organizations aiming to enhance their cybersecurity posture and protect against prevalent cyber threats. Businesses must adhere to CIS cybersecurity standards, and although conformity is voluntary, it is widely adopted across various industries for best practices. Adherence to..
Strengthening Cyber Resilience: A Milestone Partnership
As the CEO of HYAS, I am thrilled to announce a pivotal partnership with ZainTECH, a trailblazer in integrated digital solutions and part of the esteemed Zain Group. This collaboration signifies a significant step forward in our shared mission to bolster cyber defenses across the Middle East, leveraging our innovative HYAS Protect solution to safeguard digital assets with unparalleled..
OWASP looks to future-proof SBOMs with CycloneDX 1.6
The OWASP Foundation has released a new version of its CycloneDX standard for software bills of materials (SBOMs) that includes a cryptographic bill of materials (CBOM), a machine-readable approach to managing SBOMs with CycloneDX Attestations (CDXAs), and data to assess the environmental impact of AI..
The Gartner® Market Guide: Unleash the Power of Network Detection and Response with AI-Augmented Detection
The Gartner® Market Guide for Network Detection and Response sheds light on the key trends and recommendations for security and risk management leaders looking to leverage NDR capabilities. MixMode was listed as a representative vendor within the market guide, offering advanced AI capabilities that enhance network detection and..
AI Driven by Human Expertise: Hyperproof’s Bold Hybrid Approach to AI in GRC
Throughout 2024, artificial intelligence (AI) has steadily revealed its potential to revolutionize industries. AI presents a particularly attractive use case in the evolving world of Governance, Risk, and Compliance (GRC). At Hyperproof, we believe organizations must move deliberately but need to avoid AI impulsiveness. In doing so, our strategy has been carefully crafted to empower... The post..
The Rise of AI Threats in Cybersecurity
With so much marketing and media hysteria surrounding the space, it's reasonable to question whether AI will really have a significant impact on cyber threats. Unfortunately, despite claims that the impact of AI on business is largely overhyped—at least, according to OpenAI's COO—it appears it will play a very significant role in the future of..
Understanding the Different Types of Audit Evidence
Audit evidence lies at the heart of cybersecurity audits and assessments, providing tangible proof of an organization’s adherence to cybersecurity measures. Being secure is not merely about having a secure infrastructure; it’s about ensuring that every aspect of that security is verifiable and transparent. Today, we’ll delve into a pivotal element of this process: audit The post..
Structured Data vs. Unstructured Data: How to Safeguard Your Business
The post Structured Data vs. Unstructured Data: How to Safeguard Your Business appeared first on..
Stale Accounts in Active Directory
What are Stale Accounts in Active Directory? Accounts that have not been used in the past six months and are no longer necessary. Stale accounts are often inactive user accounts. They are an account from a user who no longer works there that was never deactivated or they are an account that was created and The post Stale Accounts in Active Directory appeared first on..