5 Ways MSPs Can Resolve a Hack

If you are a managed service provider (MSP) handling small and medium-sized businesses (SMB) clients, ...
Cybersecurity Insights with Contrast CISO David Lindner | 10/6

Cybersecurity Insights with Contrast CISO David Lindner | 10/6

Insight #1 AI voice cloning is a problem: It’s reportedly taken the top spot in scam trends, particularly targeting seniors. “My voice is my passport” can no longer be a thing.  ...
Cybersecurity Insights with Contrast CISO David Lindner | 9/29

Cybersecurity Insights with Contrast CISO David Lindner | 9/29

Insight #1 For years — since 2018 — the National Institute of Standards and Technology (NIST) has said that password length trumps password complexity requirements. Now LastPass is forcing users into choosing ...
MGM Breach Takeaway: On-Prem Has Become Attackers’ Gateway to the Cloud

MGM Breach Takeaway: On-Prem Has Become Attackers’ Gateway to the Cloud

Last week, the BlackCat ransomware group (also known as ALPHV) attacked the operations of MGM Resorts and forced them to shut down their IT systems. What sets this attack apart from more ...
ransomware RagnarLocker takedown

External Exposure Management: Key to Safeguarding Your Attack Surface

The number of security threats continues to grow rapidly with each passing year. Security teams work tirelessly to mitigate every alert labeled ‘high priority’—but there are too many, and it’s tough to ...
Security Boulevard
The LastPass Attack Gets Worse, What is Gamification, Signal's Encryption Standoff

The LastPass Attack Gets Worse, What is Gamification, Signal’s Encryption Standoff

Popular password manager LastPass suffered a second attack that lasted for over two months. Now new and disturbing information is being released about the attack. Scott discusses the benefits and challenges of ...

Major Database Security Threats & How You Can Prevent Them

Organizations and businesses must use a range of measures, protocols, and tools to protect their databases from cybercriminals. If breached, malicious actors can gain access to sensitive information that they can use ...
threat-hunting program. threat hunting, teams, intelligence, Edge Devices data threats IT cybersecurity defense attack alerts machine identity management insider threats security phishing Cybersecurity Threats on the Rise

Graph-Fueled Defense-in-Depth Can Strengthen Security Posture

“GM Customer Accounts Hacked”, “Hacker Steals Database of Hundreds of Verizon Employees”, “Ransomware Attack Hits New Jersey County”. Another day, another breach, hack or ransomware attack. In fact, the average cost of a ...
Security Boulevard
Live at DEF CON 30 feat. Kevin Johnson

Multi-Factor Authentication Fatigue Attack, Signal Account Twilio Hack, Facebook and Instagram In-App Browser

A Cisco employee was compromised by a ransomware gang using a technique called multi-factor authentication fatigue, an attack on the Signal messenger app’s SMS service Twilio potentially disclosed the phone numbers of ...
Microsoft Teams Okta Zoom cybersecurity CEO MS teams

Preventing CEO Impersonation Phishing Scams

Phishing scams are hardly a new concept. In fact, the first phishing attacks date back nearly 30 years to the mid-1990s. But despite the tactic’s age, it remains incredibly popular among cybercriminals ...
Security Boulevard