security
How Can CIOs Prepare Their Organizations for Generative AI?
Nik Hewitt | | advice, AI, Best Practices, Cybersecurity, next gen security, security, Security Research, Supply Chain Attacks
Generative AI: A new challenge in preparing organizations and setting policies In our swiftly evolving and ‘somewhat spicey’ digital age, Chief Information Officers (CIOs) now find themselves at the helm of navigating ...
The TikTok Ban Bill, Your Car is Spying on You, Signal’s Username Update
Tom Eston | | Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Federal Privacy Law, Information Security, Infosec, insurance, Insurance Companies, messaging, phone numbers, Podcast, Podcasts, Privacy, secure messaging, security, signal, surveillance, technology, TikTok, TikTok Ban, tracking, US government, usernames, Weekly Edition
In episode 321, the hosts discuss how connected cars are sharing driving data with insurance companies, potentially leading to increased rates for drivers. They also talk about the anti-TikTok bill passed by ...
Microsoft Entra ID: The Complete Guide to Conditional Access Policies
Ori Amiga | | Azure Active Directory, EntraID, identity management, Identity-First Security, research, security, Technical
Here it is – everything you need to know about using Entra ID’s Conditional Access policies to boost your identity security posture. Microsoft Entra ID (formerly Azure Active Directory) is Microsoft’s cloud-based ...
10 Takeaways from the 2024 Gartner IAM Summit UK
[email protected] | | Cool Vendor, Gartner, identity management, Identity Security Posture Management, Identity-First Security, ITDR, Market, security
I had the privilege of attending the Gartner IAM Summit in London. The conference focused on one of the most critical aspects of our digital world: identity-first security. After having some time to ...
The Importance of Compliance Hardening
Nik Hewitt | | advice, Best Practices, Cybersecurity, microsegmentation, next gen security, security, Security Research, service account protection, zero trust
Navigating compliance hardening: A critical pillar of organizational cybersecurity Safeguarding digital assets against ever-evolving threats demands not just vigilance but a proactive stance towards compliance hardening. This approach ensures that systems are ...
Changes Included in the Stable Release 24.02 of Azul Zing Builds of OpenJDK
Azul Platform Prime is a Java platform with a modern, TCK-compliant JVM, Azul Zing, based on OpenJDK. Zing provides low, consistent response latency of your Java workloads, higher total throughput and carrying ...
Look Good & Gain Peace of Mind with Fairwinds’ Managed Kubernetes
Identifying and remediating Common Vulnerabilities and Exposures (CVEs) as soon as possible is important for businesses, particularly when a new vulnerability is disclosed. In organizations using microservices, containers, and Kubernetes, such vulnerabilities ...
CVE-2024-21412 Vulnerability Reported in Defender SmartScreen
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, microsegmentation, next gen security, security, Security Research, service account protection, vulnerability, zero trust
Guarding against SmartScreen bypass (CVE-2024-21412) and DarkGate malware campaign A recent surge in cyberattacks has seen malevolent actors exploiting a vulnerability in Windows Defender SmartScreen, a critical security feature designed to protect ...
Building a Security Culture of Shared Responsibility
These seven major factors can contribute to (or hinder) the development of a positive cybersecurity culture ...
Security Boulevard
New Phishing Campaign Delivers Remote Access Trojans (RATs)
Nik Hewitt | | Best Practices, lateral movement, next gen security, Phishing, security, Security Research, Security Training, zero trust
Sophisticated phishing campaign leverages public services, where remote access Trojans are being delivered via malicious Java downloader A new phishing campaign has surfaced this week which cleverly employs a Java-based downloader to ...