The Center for Internet Security (CIS) Use Cases and Cost Justification

Vince Lombardi, the famous football coach, used to start his training camp each season with a talk about doing the basics. He’d tell the players that they start with the basics, then ...

What You Need to Know About Salesforce’s Recycle Bin

In order to protect users from accidentally losing data, Salesforce has provided the Recycle Bin. If any important data disappears, administrators and certain users have the option of restoring that data from ...

Accidentally stepping on a DeFi lego

| | blockchain, Exploits
The initial release of yVault contained logic for computing the price of yUSDC that could be manipulated by an attacker to drain most (if not all) of the pool’s assets. Fortunately, Andre, ...

SANS survey highlights pandemic-influenced hiring plans

Way back in March, when most of us were still working in the office and taking restaurant dining for granted, the SANS Institute launched their survey on “Closing the Critical Skills Gap ...
G Suite Apps Supported

Enabling Data Protection and Compliance in the G Suite Environment

By Matt Hines, VP of Marketing at CipherCloud & Ishani Sircar, Product Marketing Manager at CipherCloud The Rise of G Suite and Related Data Security Challenges With over 2 billion active users ...

API Security Need to Know: Questions Every Executive Should Ask About Their APIs

Using NIST CSF to Reign in your API Footprint As your digital transformation accelerates, it’s API volume and usage has accelerated in tandem. It is also very likely that your API security ...

Opportunities for Risk Management in the ?Great Reset?

The World Economic Forum characterizes the coming years as ?the great reset? with accelerated efforts towards digital capabilities. Risk and security teams must treat integration as a core element of their strategies ...

5 Ways to Keep Your Security and Operations Teams in Lockstep

Malicious activity is on the rise, especially with COVID-19 and many businesses transitioning to a remote workforce. During the first 100 Days of the pandemic, there was a 33.5 percent increase in ...

How Big Tech Collects Your Private Data and How to Delete It

In episode 132 for August 3rd 2020: How the big tech companies like Google, Apple, Facebook, and Twitter collect your private data and how you can delete it with Kira Rakova from ...
Styra

Styra Adds Declarative Tool to Generate Authorization Policies

Styra this week launched a declarative tool that enables cybersecurity teams to generate authorization policies that can be implemented programmatically by a DevOps team. Company CEO Bill Mann said Rego Policy Builder ...
Security Boulevard