The Abnormal Security team just launched a new threat intel site named Abnormal Intelligence. Crane Hassold shares resources available, including an attack library, semiannual threat intel reports, a glossary and exclusive insights from the Abnormal team.
Multifactor authentication was supposed to be the standard, but the sharp rise in highly successful MFA bypass attacks shows the industry needs to go further in verifying identities. Keynote speakers at Authenticate 2022 said the future of passwordless technology could answer this latest threat.
Perennial leaders ForgeRock, Ping Identity and IBM, along with a surging Okta, set themselves apart from the pack of CIAM vendors in the latest report by KuppingerCole analysts. Ping Identity leapfrogged ForgeRock to capture the gold in product leadership, and IBM once again took the bronze.
Looking to rationalize their security stacks and narrow their lists of critical suppliers, cybersecurity leaders are eyeing new consolidation strategies. WatchGuard's Corey Nachreiner opens up on the benefits of working with a single vendor or a small group of vendors.
A phishing and fraud prevention vendor has bought a startup founded by Qualys' longtime engineering leader to help organizations more effectively discover and monitor assets. Red Sift says its purchase of Hardenize will help customers assess the security of their digital asset inventory.
CEO Yotam Segev says Cyera eschews the focus of data loss prevention tools on blocking users from pulling down data and instead embraces an approach that reduces friction. Cyera has sought to safeguard data by making preventative changes in areas like configuration, permissions and security posture.
Immersive Labs completed a funding round just weeks after laying off 10% of its workforce to cover more developer languages and safeguard Azure and Google Cloud. The Ten Eleven Ventures-led funding will help Immersive Labs expand its coverage from frontline cybersecurity staff to development teams.
A hacker who stole cryptocurrency says he should walk away with the majority of his loot and put that plan up for a vote to the people from who he stole, using votes tied to the stolen cryptocurrency to vote yes. "Seriously though, wtf is wrong with our industry?" tweeted a web3 consultant.
In Part 1 of a three part-video series, Andrew Abel, a cybersecurity and zero trust consultant and CyberEdBoard member, and Chase Cunningham, CSO at Ericom Software, share tips on how to create an identity strategy within the broader context of zero trust.
The Google-Mandiant marriage will combine Google's security monitoring tools with Mandiant's threat intel and attack surface management solutions, plus new SOAR and file and URL analyzer capabilities, to create an "end-to-end threat intelligence and cybersecurity operations suite."
Hackers have appropriated a red-teaming tool to hack their way into organizations, warns the Department of Health and Human Services. Tens of thousands of organizations each year are affected by a hack involving Cobalt Strike. But companies can spot the tool and should act quickly if they do.
In this episode of "Cybersecurity Unplugged," as the use of Kubernetes and cloud containers over traditional forms of storage continues to increase, Nikki Robinson of IBM discusses the benefits of breaking down "complicated environments into something that's tangible and easy to manage."
Crypto exchange Binance restored operations on its BSC Token Hub smart contract early Friday, hours after a $568.6 million hack. It upgraded the vulnerable contract in a new version and shared plans for potential measures to address this incident and increase security measures.
Crypto exchange Binance paused its smart contract platform Binance Smart Chain after a hacker exploited an internal verification vulnerability to steal cryptocurrency from its cross-chain bridge. Binance has acknowledged a theft of at least $100 million; PeckShield says hackers stole $586 million.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.co.uk, you agree to our use of cookies.