Layered Security Elements for Defense in Depth

Using layered security elements for the best possible defense-in-depth cybersecurity approach  Layered security elements, also known as defense-in-depth (DiD), is a cybersecurity approach that uses multiple layers of defense to protect a ...
Account Takeover | Word of the Day

Account Takeover (ATO) Fraud: How it Happens & How it’s Prevented

Discover what an account takeover is & common warning signs. We also share steps to prevent unauthorized access to client's personal & financial accounts ...
What value do Red Team exercises provide to security awareness programs?

Navigating Security Awareness in the Tech Industry with Erin Gallagher

In this episode Erin Gallagher, cybersecurity awareness lead at Fastly, discusses her journey into the field of security awareness and her unique approach to enhancing cybersecurity within tech companies. Erin shares her ...
Data Breach Cost

10 Essentials Every Anti-Phishing Course Must Have

In August 2023, Russian threat actors targeted several government agencies worldwide with Microsoft Teams phishing attacks. Many of these attacks were successful because unsuspecting users fell for the lures set by the ...
What is HSM Integration?

What is HSM Integration?

HSM Integration refers to the process of incorporating a Hardware Security Module (HSM) into an organization’s IT and security infrastructure. HSMs are physical devices designed to secure digital keys and perform cryptographic ...
Akira ransomware

Akira Ransomware Group Takes in $42 Million From 250 Attacks in a Year

| | Akira, cisa, Linux, Ransomware
CISA and the FBI profile a highly adaptable and constantly evolving threat gang that targets both Windows and Linux systems ...
Security Boulevard

USENIX Security ’23 – On the Security Risks of Knowledge Graph Reasoning

Authors/Presenters: *Zhaohan Xi, Tianyu Du, Changjiang Li, Ren Pang, Shouling Ji, Xiapu Luo, Xusheng Xiao, Fenglong Ma and Ting Wang* Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s ...
Review: ‘Artificial Intelligence — A Primer for State and Local Governments’

Review: ‘Artificial Intelligence — A Primer for State and Local Governments’

|
A new book by Alan Shark offers an excellent guide and an AI road map for state and local governments. He answers basic questions that public-sector leaders are asking in 2024.    ...

USENIX Security ’23 – PrivGraph: Differentially Private Graph Data Publication by Exploiting Community Information

Authors/Presenters: *Quan Yuan, Zhikun Zhang, Linkang Du, Min Chen, Peng Cheng, Mingyang Sun* Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to ...
What is Mobile Application Security Testing? Explained

What is Mobile Application Security Testing? Explained

| | Cyber Security, VAPT
Mobile application security testing is a critical aspect of modern software development, driven by the widespread use of mobile devices in our daily lives, which store vast amounts of personal data like ...

Secure Guardrails