Layered Security Elements for Defense in Depth
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, lateral movement, next gen security, security, Security Research
Using layered security elements for the best possible defense-in-depth cybersecurity approach Layered security elements, also known as defense-in-depth (DiD), is a cybersecurity approach that uses multiple layers of defense to protect a ...
Account Takeover (ATO) Fraud: How it Happens & How it’s Prevented
Discover what an account takeover is & common warning signs. We also share steps to prevent unauthorized access to client's personal & financial accounts ...
Navigating Security Awareness in the Tech Industry with Erin Gallagher
Tom Eston | | Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, empathy, Episodes, Information Security, Infosec, Phishing, phishing awareness, Podcast, Podcasts, Privacy, security, Security Awareness, security awareness training, social engineering, startup, Startups, Tech, tech industry, technology, Weekly Edition
In this episode Erin Gallagher, cybersecurity awareness lead at Fastly, discusses her journey into the field of security awareness and her unique approach to enhancing cybersecurity within tech companies. Erin shares her ...
10 Essentials Every Anti-Phishing Course Must Have
In August 2023, Russian threat actors targeted several government agencies worldwide with Microsoft Teams phishing attacks. Many of these attacks were successful because unsuspecting users fell for the lures set by the ...
What is HSM Integration?
HSM Integration refers to the process of incorporating a Hardware Security Module (HSM) into an organization’s IT and security infrastructure. HSMs are physical devices designed to secure digital keys and perform cryptographic ...
Akira Ransomware Group Takes in $42 Million From 250 Attacks in a Year
CISA and the FBI profile a highly adaptable and constantly evolving threat gang that targets both Windows and Linux systems ...
Security Boulevard
USENIX Security ’23 – On the Security Risks of Knowledge Graph Reasoning
Authors/Presenters: *Zhaohan Xi, Tianyu Du, Changjiang Li, Ren Pang, Shouling Ji, Xiapu Luo, Xusheng Xiao, Fenglong Ma and Ting Wang* Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s ...
Review: ‘Artificial Intelligence — A Primer for State and Local Governments’
A new book by Alan Shark offers an excellent guide and an AI road map for state and local governments. He answers basic questions that public-sector leaders are asking in 2024. Â Â ...
USENIX Security ’23 – PrivGraph: Differentially Private Graph Data Publication by Exploiting Community Information
Authors/Presenters: *Quan Yuan, Zhikun Zhang, Linkang Du, Min Chen, Peng Cheng, Mingyang Sun* Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to ...
What is Mobile Application Security Testing? Explained
Mobile application security testing is a critical aspect of modern software development, driven by the widespread use of mobile devices in our daily lives, which store vast amounts of personal data like ...