Cybersecurity

Uncertainty is the most common driver of noncompliance – Help Net Security

Most compliance leaders tend to focus on building an ethical culture in their organizations to improve employee behavior, but it has a limited impact on addressing uncertainty about how to be compliant, according to a survey by Gartner. Three primary situations that lead to noncompliance There are three primary situations that lead to noncompliance: Situations […]

Cybersecurity

Mispadu Trojan Targets Europe, Thousands of Credentials Compromised

The banking trojan known as Mispadu has expanded its focus beyond Latin America (LATAM) and Spanish-speaking individuals to target users in Italy, Poland, and Sweden. Targets of the ongoing campaign include entities spanning finance, services, motor vehicle manufacturing, law firms, and commercial facilities, according to Morphisec. “Despite the geographic expansion, Mexico remains the primary target,” […]

Cybersecurity

Human vs. Non-Human Identity in SaaS

In today’s rapidly evolving SaaS environment, the focus is on human users. This is one of the most compromised areas in SaaS security management and requires strict governance of user roles and permissions, monitoring of privileged users, their level of activity (dormant, active, hyperactive), their type (internal/ external), whether they are joiners, movers, or leavers, […]

Cybersecurity

UK Downplays Ransomware Threat at Its Peril, Says Committee

Fraud Management & Cybercrime , Geo Focus: The United Kingdom , Geo-Specific Parliamentary Committee Says UK Must Be More Aggressive Akshaya Asokan (asokan_akshaya) • December 12, 2023     The U.K. Joint Committee on the National Security Strategy recommended that the government elevate ransomware as an issue. (Image: Shutterstock) A U.K. parliamentary committee investigating ransomware […]

Cybersecurity

The future of cloud security

As organizations around the world prioritize digitization, the focus on cloud security is rapidly growing. Security flaws such as limited visibility, lack of threat detection and response capabilities, and the inability to detect unknown threats or misconfigurations within cloud environments, can all have devastating consequences. Misconfigured cloud resources can cause unintentional data leaks, and an […]