Security News
In this Help Net Security interview, Hillary Baron, Senior Technical Director for Research at CSA, highlights that the recent surge in organizations establishing dedicated SaaS security teams is driven by significant data breaches involving widely used platforms. The challenge of securing a SaaS environment demands a multifaceted security strategy and that starts with a strong SaaS security team.
API sprawl - Researchers identified 1.7 million APIs in March alone-creating an uncharted network of 'shadow' and 'zombie' APIs that operate behind the scenes of many enterprise applications. Attacks targeting JSON and XML content types accounted for 38% of the blocks observed, highlighting attackers' focus on APIs.
The research reveals that 40% of cyber teams have not reported a cyber incident out of fear of losing their jobs - a disclosure that signifies a serious underreporting of cyber breaches globally. A rising skills gap between cyber teams and criminals.
In addition to the convenience of password storage and autofill, password managers generate complex and lengthy passwords to prevent bad actors from gaining access to proprietary data and confidential information. There are password managers designed for individual and family use, and there are enterprise password managers that enable teams of users to access and share resources securely.
Only 17% of respondents to the ISC2 Cybersecurity Workforce Study were women, showing a continued struggle for workplaces to recruit and retain women in this industry. Notably, women reported more women on their teams: 30% of women said there were other women on their teams, as opposed to 22% of men.
Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.
Cloud Console Cartographer is an open-source tool that maps noisy log activity into highly consolidated, succinct events to help security practitioners cut through the noise and understand console behavior in their environment. "Infrastructure as code has replaced a lot of the need for console access for many organizations, but there are still plenty of instances where the console is still being used, and in some cases, you need to use the AWS console to perform certain actions. Cloud Console Cartographer cuts through the noise generated in logs by those console sessions," Daniel Bohannon, Permiso's Principal Threat Researcher, told Help Net Security.
The introduction of Open AI’s ChatGPT was a defining moment for the software industry, touching off a GenAI race with its November 2022 release. SaaS vendors are now rushing to upgrade tools with...
Open source password managers make their code accessible to the public, allowing users to customize the software to suit their needs. With that, I've created a list of the best open source password managers for teams and businesses.
After another year rife with cybercrime, IT and cyber leaders are confronted with a new reality. AI and deepfakes can trick even the most well-trained employee, and executing a strong cyber defense is more important than ever.