security
Seven Common Lateral Movement Techniques
Nik Hewitt | | advice, Best Practices, lateral movement, next gen security, security, Security Research
Inside the Attacker’s Playbook: Unmasking the most common lateral movement techniques Lateral movement techniques refer to the methods employed by attackers to move through a network, seeking to escalate privileges, access sensitive ...
Insider Indicted for Attempting to Sabotage California Water Plant
Earlier this month, Rambler Gallo pled not guilty to charges that he attempted to sabotage the water treatment facility in Discovery Bay, California. The facility provides treatment for the water and wastewater ...
Security Boulevard
How Ransomware Spreads and How Microsegmentation Stops It
Bruce Lynch | | advice, Best Practices, lateral movement, microsegmentation, next gen security, Ransomware, security, Security Research, zero trust
Ransomware impacts more than seven in ten companies worldwide, and understanding how ransomware spreads is critical to finding solutions to stop it Ransomware is malicious software threat actors use to infiltrate a ...
Microsoft Lost Its Keys, Voice Cloning Scams, The Biden-Harris Cybersecurity Labeling Program
Tom Eston | | azure, Biden-Harris, china, Cyber Security, Cybersecurity, Cybersecurity Labeling Program, Data breach, Data Privacy, Digital Privacy, Episodes, Influencer, Information Security, Infosec, Mia Dio, Microsoft, phone scams, Podcast, Podcasts, Privacy, Scams, security, security breach, smart devices, technology, TikTok, Voice Cloning, Voice Cloning App, Weekly Edition, White House
In this episode, we discuss the recent Microsoft security breach where China-backed hackers gained access to numerous email inboxes, including those of several federal government agencies, using a stolen Microsoft signing key ...
Cleantech and Quantum Computing: Critical Infrastructure Cybersecurity
As cleantech becomes a bigger part of U.S. critical infrastructure, it faces a bigger risk from cyberattackers leveraging quantum attacks ...
Security Boulevard
The Great Google Experiment: Googlers Trapped in an Internet-Free Wonderland
The Internet is a treacherous playground, and wouldn’t you know it, Google, the wise old seer of the digital realm, is suggesting that its employees disconnect from the very beast they helped ...
Maximizing Cybersecurity ROI
Nik Hewitt | | advice, Best Practices, Cybersecurity, next gen security, security, Security Research
Maximizing ROI from your cybersecurity investments is key to getting the best out of your security stack “Times being what they are,” cybersecurity investments aren’t an option anymore – they’re a necessity ...
Radware Bot Risk Scanner Safeguards Your Splunk Applications From Malicious Bots
Twenty-five percent of all internet traffic today is generated by bad bots. Unfortunately, many organizations cannot make a definitive distinction between good and bad bots. This leaves their applications vulnerable to malicious ...
The Strategic Advantage of a Multi-Layered Cybersecurity Approach
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, lateral movement, network segmentation, next gen security, security, Security Research, zero trust
Adopting a multi-layered cybersecurity strategy has become an imperative like never before As we all know, cybersecurity threats are becoming more sophisticated and pervasive, posing an immense challenge to businesses. Now, more ...
How to Stay Up on Cybersecurity Trends
Staying up on the cybersecurity trends and the things CISOs and IT security practitioners need to know for optimal protection Six years ago, I knew very little about the world of cybersecurity, ...