Best Practices
Cloud Repatriation Impacts on Resources and Cybersecurity
Nik Hewitt | | advice, Best Practices, Cloud, Cybersecurity, lateral movement, microsegmentation, next gen security, security, Security Research, visibility, zero trust
The cloud repatriation surge and the impact on SOS resources and business cybersecurity In recent years, the cloud computing landscape has witnessed a significant yet somewhat surprising trend: cloud repatriation. This movement ...
How Can CIOs Prepare Their Organizations for Generative AI?
Nik Hewitt | | advice, AI, Best Practices, Cybersecurity, next gen security, security, Security Research, Supply Chain Attacks
Generative AI: A new challenge in preparing organizations and setting policies In our swiftly evolving and ‘somewhat spicey’ digital age, Chief Information Officers (CIOs) now find themselves at the helm of navigating ...
The Importance of Compliance Hardening
Nik Hewitt | | advice, Best Practices, Cybersecurity, microsegmentation, next gen security, security, Security Research, service account protection, zero trust
Navigating compliance hardening: A critical pillar of organizational cybersecurity Safeguarding digital assets against ever-evolving threats demands not just vigilance but a proactive stance towards compliance hardening. This approach ensures that systems are ...
Microsoft Under Attack by Russian Cyberattackers
Understand how these attackers are operating and what their tactics mean for security strategies ...
CVE-2024-21412 Vulnerability Reported in Defender SmartScreen
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, microsegmentation, next gen security, security, Security Research, service account protection, vulnerability, zero trust
Guarding against SmartScreen bypass (CVE-2024-21412) and DarkGate malware campaign A recent surge in cyberattacks has seen malevolent actors exploiting a vulnerability in Windows Defender SmartScreen, a critical security feature designed to protect ...
Don’t Miss These Emerging Trends in Cloud Application Security
Get details on trends and best practices in cloud application security ...
New Phishing Campaign Delivers Remote Access Trojans (RATs)
Nik Hewitt | | Best Practices, lateral movement, next gen security, Phishing, security, Security Research, Security Training, zero trust
Sophisticated phishing campaign leverages public services, where remote access Trojans are being delivered via malicious Java downloader A new phishing campaign has surfaced this week which cleverly employs a Java-based downloader to ...
Why Application Segmentation is a Business Essential
Nik Hewitt | | advice, application protection, application-centric, applications, Best Practices, Cybersecurity, lateral movement, microsegmentation, network segmentation, Security Research, Uncategorized, zero trust
Why is application segmentation so important for solid cybersecurity protection? Application segmentation plays a crucial role in organizational cybersecurity for several compelling reasons. Individually segmenting our numerous applications involves dividing a network’s ...
GUEST ESSAY: A DIY guide to recognizing – and derailing – Generative AI voice scams
Americans lost a record $10 billion to scams last year — and scams are getting more sophisticated. Related: Google battles AI fakers Recently used to impersonate Joe Biden and Taylor Swift, AI voice cloning ...
Using AI to Reduce False Positives in Secrets Scanners
Get an overview of how secrets scanners work, and how Legit is dramatically reducing secret-scanning false positives ...