article thumbnail

Whitepaper: The Intersection of Technical Debt and Cybersecurity

Approachable Cyber Threats

To help organizations solve this challenge, Hive Systems and BARR Advisory partnered on an in-depth whitepaper to explore the intersection of cybersecurity and technical debt. With such a wide net, understanding how technical debt impacts your business and cybersecurity efforts can be a challenge.

article thumbnail

10 Lessons Learned from the Top Cyber Threats of 2021

Security Boulevard

We published a whitepaper about Tactics, Techniques, and Procedures (TTPs) and also tools utilized by the DarkSide threat actors. . The post 10 Lessons Learned from the Top Cyber Threats of 2021 appeared first on Security Boulevard. Most notably, US-based Colonial Pipeline Company paid 4.4 Lessons Learned: 3.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Augmenting Legacy Controls with AI-driven Threat Detection and Response

Security Boulevard

As organizations grapple with the limitations of legacy security controls in the face of increasingly sophisticated cyber threats, integrating AI-driven threat detection and response capabilities presents a compelling opportunity to bolster their defenses.

article thumbnail

MITRE introduces D3FEND framework

Malwarebytes

D3FEND enables cybersecurity professionals to tailor defenses against specific cyber threats, thereby reducing a system’s potential attack surface.”. The “tailor defenses against specific cyber threats” immediately gave me the mental image of a game of whack-a-mole.

article thumbnail

MalwareBazaar – welcome to the abuse-ch malware repository

Security Affairs

The purpose of the project is to collect and share malware samples, helping IT-security researchers and threat analyst protecting their constituency and customers from cyber threats.” “As many IT-security researchers, I’m heavily using public available information (OSINT) for hunting down new cyber threats. .

Malware 53
article thumbnail

From a tech explosion to accidental cyberattacks, researchers offer a glimpse into 2030

SC Magazine

The researchers presented Monday afternoon at the RSA Conference, to tease a soon-to-be-released whitepaper of their work. The project is based on work Baines did for Europol’s Cyber Crimes Center, Project 2020, which made a similar series of predictions in 2013 targeting last year.

article thumbnail

What Matters Most: Remediating Vulnerabilities

NopSec

is the industry leader in helping small and medium enterprises with friction-less remediation of their cyber threats and vulnerabilities. Download our free whitepaper, Remediation 101 , today. Unified VRM 4.0 Learn more about a remediation process that takes you beyond scanning.

InfoSec 40