Blog
Account takeover fraud: 5 steps for protecting your customers
According to research by the Aite Group, financial institutions are facing a 64% uptick in account takeover attacks than before the pandemic. This number is expected to rise further as the digital ...
Netography Fusion Enhancements Give SOC, NOC, and AIOps Teams Faster Detection and Response to Anomalies and Threats, Automated Context Label Creation
The latest release of Netography Fusion improves your SOC, NOC, and AIOPs teams’ ability to accelerate and simplify their detection and response workflows and automate context label creation. The post Netography Fusion ...
How to Safeguard PHI From Healthcare SaaS Risks
Josh Smith, Strategic Alliance Manager @ AppOmni | | Blog, PHI, SaaS Security, SaaS Security Posture Management
Learn five critical steps to strengthen your organization’s security culture, protect PHI, and maintain regulatory compliance. The post How to Safeguard PHI From Healthcare SaaS Risks appeared first on AppOmni ...
Detecting Compromises of NetScaler (Citrix) ADC and Gateway with NetFlow
NetFlow is a powerful tool for answering post-compromise questions, in this case, the RCE vulnerability affecting NetScaler (formerly Citrix) Application Delivery Controller (ADC) and NetScaler Gateway (CVE-2023-3519). The post Detecting Compromises of ...
Cyber Risk Management as a Best Practice: Benefits to Financial Firms
According to BitSight, the financial services industry is a high-value target for threat actors. Firms in this sector are 300 times more likely to be targeted by a cyberattack and over 50% ...
Understanding and Implementing Biden’s National Cybersecurity Strategy
The Biden-Harris Administration has released the National Cybersecurity Strategy Implementation Plan (NCSIP), outlining its commitment to improving cybersecurity in America. The plan focuses on two primary shifts: allocating more responsibility for mitigating ...
IoT Email Authentication: Why It Matters
Internet of Things (IoT) email authentication is becoming ... The post IoT Email Authentication: Why It Matters appeared first on EasyDMARC ...
Achieving Cloud Compliance: How Solvo Simplifies and Strengthens Your Security Posture Automatically
Team Solvo | | Blog, CloudCompliance, Cybersecurity, datasecurity, Solvo, SolvoSolutions, technology
Compliance with information security and privacy regulations is a critical concern for organizations operating in cloud-native environments. The speed and frequency of changes in these dynamic environments pose a challenge, as misconfigured ...
Quarterly GRIT Ransomware Report – Q2 2023
GuidePoint Security | | Blog, Cybersecurity, GRIT, GRIT Blog, Incident Response & Threat Intelligence, Ransomware, Report
With the second quarter of 2023 behind us, it’s time to talk about GRIT’s findings from April, May, and June. […] ...
Mitigating Risks in KYC Processes: Preventing Threats in KYC Documentation
“Follow the money” has long been used as a catchphrase to locate corruption, but it is also the best way to determine where cybercriminals will strike. The latest 2023 Verizon Data Breach ...