Remove Architecture Remove CISO Remove Passwords Remove Threat Detection
article thumbnail

What Real-Life SaaS Attack Misconfiguration Exploits Can Teach Us

IT Security Guru

CISOs and security professionals work to limit this burgeoning threat landscape, however, it’s a work in progress. . 60% of Microsoft Office 365 and G Suite tenants have been targeted with IMAP-based password-spraying attacks, according to researchers. Attackers target Citrix with insecure legacy protocols.

CISO 102
article thumbnail

5 Major Cybersecurity Trends to Know for 2024

eSecurity Planet

Government actions will increase: Expect more government regulations, state-sponsored cyberattacks, and increased documentation required to protect CISOs. Christine Bejerasco, CISO of WithSecure , expands that “in the physical dimension, poisoning the well could impact communities in the area.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Lapsus$ Attack on Okta: How to Evaluate the Impact to your Organization

Security Boulevard

According to a blog penned by the Okta CISO, here’s what happened: On January 20 2022, a third-party customer support engineer working for Okta had their account compromised by Lapsus$. The threat actor compromised information from up to 366 Okta customers. Reset password for Okta admins. SOC Detection Rules for Okta.

article thumbnail

How Smart Organizations Mitigate Cyber Risks in a World of Unknown Unknowns

CyberSecurity Insiders

By Shay Siksik, VP Customer Operations and CISO, XM Cyber. Today, most security control resources are deployed on threat detection and response products. Using a strong, unique password is a simple thing, but people consistently fail to do so. There are things we know: 2 + 2 = 4, for example.

article thumbnail

CSTA Turns 400 – Proof That Technology Integrations Is Exactly What You Are Looking For

Cisco Security

The Cigent D3E integration with Cisco Secure Endpoint provides a highly effective automated response mechanism to threats detected on Windows 10 endpoints. Varonis is a pioneer in data security and analytics, specializing in software for data protection, threat detection and response, and compliance. Read more here.