article thumbnail

The people problem: Large businesses shift resources to address risks tied to new and disgruntled employees

SC Magazine

The lasting impact of 2020 on cybersecurity has come more clearly into relief, as security professionals reported more mature, effective strategies and approaches spanning threat prevention, detection and response – with many businesses reallocating resources to address risks tied to the workforce.

Risk 65
article thumbnail

Mastering Identity and Access Management in the Cloud

CyberSecurity Insiders

The migration of business services, apps and data in the cloud has blurred traditional corporate perimeter. Legacy security solutions, based on securing the perimeter, are no longer adequate to address cloud security challenges and risks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SecureWorld Returns to Houston with Energy and Enthusiasm

SecureWorld News

SecureWorld returned to Houston for the first time in four years with a conference agenda loaded with impactful panels, vendors tackling topics top of mind to cybersecurity professionals, and a buzz of excitement to be back together again to network, commiserate, and share successes. "It We call them cybersecurity champions," Chiock added.

CISO 80
article thumbnail

Q&A with Giles Inkson: A Guide to Digital Operational Resilience Act (DORA)

NetSpi Executives

Digital Operational Resilience Act (DORA) is a regulation in the European Union (EU) that’s significantly reshaping organisational approaches to cybersecurity. It ensures sound measures for managing ICT third-party risks, including supply chain attacks. Read the article: 3 Software Supply Chain Risks in 2023 2.

article thumbnail

With thousands of vendors, companies typically have limited grasp over supply chain security

SC Magazine

While 80% of the 1,500 technology and procurement chiefs surveyed by BlueVoyant had experienced at least one breach caused by a third-party vendor 12 months prior, most (anywhere from 71% to 81%, depending on the industry) don’t monitor all third-party suppliers for cyber risk. It’s something that can no longer be overlooked.”.

Risk 70
article thumbnail

NetSPI’s Analysis of HTTP/2 Rapid Reset 

NetSpi Executives

A novel 0-day vulnerability referred to as, “HTTP/2 Rapid Reset,” (CVE-2023-44487) sent the cybersecurity industry into quick action to minimize potential risks. This vulnerability abuses certain features of HTTP/2 protocol and allows for Distributed Denial of Service (DDoS) attacks at an unprecedented scale.

DDOS 52
article thumbnail

Weakness at the Network Edge: Mandiant Examines 2022’s Zero-Day Exploits

eSecurity Planet

” The three activity sets included a campaign against the Philippine government between March and May 2022; a campaign against telecommunications and business service providers in South Asia in April 2022; and a campaign against organizations in Belarus and Russia in May 2022.

Firewall 104