Defense in Depth at the Identity Perimeter to Mitigate Coronavirus Social Engineering Risk

The rapid acceleration from on-location to remote workforce as part of the Coronavirus Pandemic response opened the door to malicious actors accelerating their phishing and social engineering attacks. Cybercriminals prey on user ...
ZeroNorth

ZeroNorth Raises $10M to Advance Risk Orchestration

ZeroNorth, a provider of a namesake platform for orchestrating risk management within the context of application development projects, announced it has garnered another $10 million in funding. Company CEO John Worrall said ...
Security Boulevard

How to Communicate Risk: Profiles, Dashboards and Responsibilities

The risk of a data breach with significant financial consequences and damage to brand equity is the fear of most large publicly traded companies. But many smaller businesses wrongly assume they are ...

How Orca’s Cloud Security Solution Detects Weak Passwords

Weak passwords are detrimental to any organization’s security. This holds for commonly used passwords, passwords that are complex but are reused across services and applications, and even highly secure passwords that have ...

Not all Risks are Equal: Why Context Matters in Cloud Security

Provisioning assets in the cloud has never been easier and with this, Gartner estimates that 90% of organizations will share sensitive data due to uncontrolled public cloud usage over the next six ...

Plights of the Round Table – Strategic Lessons from the Casino

In Part 1 of the Plights of the Round Table, the executive staff of Camelot was working on the strategic plan for the following year. Morgan, the CEO, needs to decide how ...

Davos 2020 World Economic Forum 2020 Global Risk Report Cyber Cliffs Notes

Each year the World Economic Forum releases their Global Risk Report around the time of the annual Davos conference. This year’s report is out and below are notes on the “cyber” content ...

How to Trust Your Service Provider

Service providers differ from suppliers, or those historically viewed as ?third party?. The differences are often subtle and hard to describe, but they bring with them very different challenges and risks to ...
Threat Hunting with Qualys: Going Beyond Your EDR Solutions

Protecting the ‘Crown Jewels’ with Threat Hunting

Qualys is a sponsor of TechSpective Cyber attacks target vulnerabilities. That is a simple, common sense reality that shouldn’t need to be pointed out. However, organizations often struggle to patch efficiently and ...

The 5 Security Challenges in the Cloud

Security Challenges Facing Cloud Deployments In the cloud, code is deployed at an increasingly neck-breaking speed. As a result, bugs, security holes, and critical errors (sometimes human) are becoming both more likely ...