Day: November 20, 2023
-
Cloud identity security success: 3 critical factors
Today, more than ever, security is all about identity. Especially in the cloud, the central management and proliferation of cloud services means that with the proper identity and permissions, one can do almost anything (legitimate or malicious). Product management has been my focus for over 15 years, and in that time, I have experienced multiple…
-
Identity security’s crucial role in safeguarding data privacy
More than 130 global jurisdictions have enacted data privacy laws. While each contains rules and requirements distinct to their regions, they share a common priority: identity security. That’s because if an attacker compromises a single identity in an organization where sensitive data is collected, stored, and handled, it’s all downhill from there. A single stolen…
-
2024, the year of elections
2024 is a year of elections, with more than 70 elections scheduled in 40 countries around the world. One of the key pillars of democracy is trust. To that end, ensuring that the Internet is trusted, secure, reliable, and accessible for the public and those working in the election space is critical to any free…
-
LummaC2 Stealer’s New Anti-Sandbox Technique? Trigonometry
New research by Outpost24 has revealed that malware developers are using sandbox evasion techniques to avoid exposing malicious behaviour inside a sandbox where malware is analysed by security researches. Outpost24’s threat intelligence team, KrakenLabs, discovered that malware developers are using trigonometry to detect human behaviour based on cursor positions to avoid automated security analysis. The Malware-as-a-Service (MaaS)…
-
Recognising Scam Patterns and Preventing Data Loss: A Unified Approach
Cybersecurity professionals stand on the frontlines, ever-vigilant against an increasing tide of cyber threats. From protecting sensitive corporate data to safeguarding our personal information, the battle against cybercrime is ongoing. In today’s digital era, cybercriminals are becoming more sophisticated and professional in their methods. Hybrid work models and broadly adopted cloud technology create highly dispersed…
-
Understanding the UK government’s new cybersecurity regime, GovAssure
With the ever-growing threat of cyberattacks on the UK government and Critical National Infrastructure cyber safety matters more than ever. With the rising tide of ever-resent threat in mind, GovAssure was launched by the UK government in April 2023. It’s a cyber security programme that aims to ensure government IT systems are fully protected from…
-
Why the DOD’s Replicator should be a model for cybersecurity
The United States Department of Defense (DOD) recently revealed a new initiative centered on securing the fundamentals of technology innovation viewed as necessary to win a strategic competition with the People’s Republic of China. The new program, called Replicator, aims to take development – particularly those pertaining to areas of artificial intelligence (AI) like robotics,…