Avsnitt
-
90% of the world's data was generated in the last two years. To keep pace with this massive proliferation of data creation and transmission, cryptographers have been working overtime to engineer increasingly complex encryption techniques.
-
From NASA to the State Department, federal agencies are relying on outdated systems, ignoring mandatory security patches and failing to protect classified data.
CISA has finally released its highly anticipated Cross-Sector Cybersecurity Performance Goals in collaboration with DHS, NIST and numerous industry leaders.
-
Saknas det avsnitt?
-
According to recent reports, Managed Security Service expenditures are set to double to nearly $50 billion in 2023.
As the tech industry continues to mature and cybersecurity skills shortages climb to record highs, many firms are turning to Managed Security Service Providers (or MSSPs) to help shore up internal security gaps. But this is only half the story; the truth is that there are a number of advantages that MSSPs provide over traditional in-house IT departments.Also, with the cost of cybercrime set to top $5 trillion over the next five years, an incredible number of cybersecurity firms have been founded in the last few years. So, how do you sift through these countless listings and pick out the perfect fit? Here are Silent Breach's top tips on how to filter out the static and discover the real talent.
-
A) What is DevSecOps and how can you benefit from it?
B) Top 5 tips from pentesters on how to harden your Web App security
-
The penetration test, or as it is fondly nicknamed, the pentest, has been a security staple for decades. But is it time for an upgrade?
As security breaches and budgets continue to bloom, many firms are looking for ways to boost their security preparedness by taking advantage of the latest innovations in AI, DevOps, and security analytics. In this episode, we'll discuss five of the latest updates to the classic penetration test, helping you decide which, if any, are a good fit for your business. -
Adoption of technologies such as Internet of Things devices (IoT), cloud applications, complex digital supply chains, open-source code, and more have resulted in the expansion of organization's attack surfaces and exposure to breaches.
Now more than ever, organizations require increased visibility into how their digital environment looks from an external perspective. Viewing your attack surface the same way as a hacker is the best way to spot and remediate attack vectors and security vulnerabilities before they can be exploited.
Generally, the larger the surface, the more entry points there are for hackers to gain unauthorized access to your organization. For that reason, it's critical to institute tools and practices to reduce your exposure as much as possible and ensure proper management and continuous monitoring.
-
With the rapid evolution of the digital world, data privacy protection has become a global trend for organizations, individuals and governments.
These entities are now increasingly reconsidering the process of collecting, storing and processing personal information which not only includes names or phone numbers, but also individual healthcare information and financial data.
-
Unfortunately, organizations across nearly every sector are still struggling to secure their public-facing applications.
In 2022, for example, Silent Breach security consultants found that 92% of web applications tested contained serious or critical security flaws. In particular, we recently reported that 97 of the 100 largest airports are similarly compromised.
A major contributor to this trend lies in the fact that, for most organizations, the attack surface is only growing. CISOs are finding that they must defend against cyberattacks on multiple fronts: web, mobile, social, physical, wireless, cloud, and insider threats, to name just the most obvious.
-
As budgets tighten and teams shrink, cybersecurity leaders will be facing an impossible challenge: how to accomplish more with fewer resources.
To make matters worse, business executives often (mistakenly) view cybersecurity as a luxury, setting it up as a prime target for any cost-cutting measures.As we head into a financial downturn, here are five ways that CISOs can maintain momentum despite a scarcity of talent and resources.
-
The heads of the FBI and MI5 met in London to deliver an unprecedented joint warning regarding China's "game changing" cyber offensives.
-
During the last year, 22% of businesses were forced to pause operations due to ransomware, often for days or weeks at a time.
But this comes as no surprise.
In just the few days it took to produce this podcast, a hospital system in Louisiana (serving 270,000 patients), the Guardian media company, and the Intrado telecoms firm were all hit by crushing ransomware attacks. While this might feel like business as usual, it is often catastrophic for those impacted.
-
Threat intelligence has come a long way since its humble beginnings as a shared blacklist of malicious IP addresses and URLs.
Today, security analysts and technicians can access curated, real-time, and targeted threat information from around the world, helping fend off attacks before any damage is done. -
When you receive a call on your phone from an unknown number, it's nearly impossible to guess who's calling. Increasingly, it could be someone vishing you.
Vishing is a term derived from "phishing" and "voice." Just like phishing involves malicious emails, vishing is a phone scam that is designed to compel you to provide your personal information.
Here's what you need to know about vishing scams, and how you can identify and avoid them. -
A string of crypto thefts and security breaches have caused some to question the overall security of a rapidly growing industry.
-
In today's digital world, cybersecurity is a critical aspect of any business. With the growing number of cyber attacks and data breaches, it's essential for companies to have robust cybersecurity measures in place to protect sensitive information, maintain business operations, and avoid reputational damage. This is where ChatGPT, a large language model developed by OpenAI, can come in handy.
-
On Friday, February 5th, a hacker breached the water plant serving Oldsmar, Florida and instructed it to increase the amount of lye in the water to extremely dangerous levels.
-
Blockchain has ushered in a new era of transparency, cryptography, and decentralization. However, there is still a long way to go to overcome glaring security challenges.
In this episode, we'll discuss some of the most common security flaws that Silent Breach routinely discovers in smart contracts and review some helpful steps developers can take to stay secure. -
While developing a cybersecurity strategy is critical for any business, the distributed nature of the blockchain introduces some interesting new challenges.
As blockchain systems continue to attract more attention from hackers, it's important to have a tailored structure in place to prevent and respond to any potential security incidents. Let's dive into the 6 steps to boosting your blockchain security. -
As the greatest software rivalry of all time, emotions can run high. So we decided to create a non-partisan fact-based analysis of Android's and iOS's cybersecurity profile.
-
According to FBI reports, Russian actors spent the summer of 2020 planning a cyber-attack against Tesla's systems.
Here's a play-by-play of how the plan unfolded, along with 3 lessons we can all learn from Tesla's close brush. - Visa fler