Video: A Spotlight on Cybersecurity: 2022 Trends and 2023 Predictions

After years of growing in importance, cybersecurity took center stage in 2022, with cyberattacks not only continuing to cause global disturbances, but also becoming the focus of legislation, organizational planning, news coverage, and even major plot points on tv. Amidst the flurry of activity, common themes have emerged regarding cyber threats and the way respond […]

Read More… from Video: A Spotlight on Cybersecurity: 2022 Trends and 2023 Predictions

What is a Supply Chain Attack and How Can Organizations Defend Against Them? 

Supply chain attacks were responsible for 62% of system intrusion incidents, according to Verizon’s 2022 Data Breach Investigations Report. This type of attack is one of the most effective ways to compromise organizations because it targets the weakest link in the security chain. Supply chain attacks usually begin by compromising a supply chain partner, such as […]

Read More… from What is a Supply Chain Attack and How Can Organizations Defend Against Them? 

What is the Relationship Between Ransomware and Phishing? 

Ransomware and phishing are usually put in two separate categories when cyberattack methodologies are discussed. However, ransomware operators are increasingly leveraging phishing tactics to deploy their malicious payloads, and the potential for compromise is exponentiating as a result.   Ransomware and Phishing – a match made in heaven  Phishing is the number one delivery vehicle for ransomware, states risk management firm Deloitte. Industry sources agree, and […]

Read More… from What is the Relationship Between Ransomware and Phishing? 

A Spotlight on Cybersecurity: 2022 Trends and 2023 Predictions

In 2022, geopolitical unrest and an expanding online attack surface contributed to the emergence of several themes across the cyber landscape. Infrastructures associated with opposing ideologies were highly targeted, with government agencies, supply chains, and IOT devices falling victim to high-profile campaigns. Cybercriminals launched increasingly advanced attacks on vulnerable entities, with DDoS, ransomware, and hacking […]

Read More… from A Spotlight on Cybersecurity: 2022 Trends and 2023 Predictions

Why Is Black Box Fuzzing Important in Key Industries? 

Black Box Fuzzers  Black box fuzzers attack code vulnerabilities the same way a real-world cybercriminal would so you can find code weaknesses before they are exploited. A form of dynamic application security testing (DAST), this tool attacks from outside the application code, using a wide range of malformed or partial code data injections to find unexpected code input […]

Read More… from Why Is Black Box Fuzzing Important in Key Industries? 

The Next Generation Of beSECURE Is Here

Introducing the All New beSECURE Platform  The newest version of beSECURE has rolled out.  This version is packed with updated and innovative features.  This new version strengthens your ability to analyze, prioritize, and simplify vulnerability management.  And the best feature, there’s no additional cost.  Meet the new features:  Get a 5-Minute Guided Tour Take a quick, step-by-step […]

Read More… from The Next Generation Of beSECURE Is Here

Application Security Tips for PCI-DSS 4.0

PCI-DSS has long been the standard for securing payment card-related information. Meeting this bar was the bare minimum requirement for showing that an organization had sufficient controls to keep this data secure. With changes to PCI-DSS already being released and required by 2024, organizations developing and running applications to collect or process payment card-related data need […]

Read More… from Application Security Tips for PCI-DSS 4.0

Automotive Industries Article

By 2024, it’s predicted there’ll be more than 400 million connected vehicles in use around the world. In Automotive Industries magazine, Aviram Jenik discusses the implications for cybersecurity and looks at how rigorous testing and standard protocols can elevate the safety of these fast-evolving vehicles.  Originally published in Automotive Industries.  Excerpt: “Industry regulators are meeting the rise in […]

Read More… from Automotive Industries Article

7 Cybersecurity Resolutions For 2022 Infographic

It’s the start of a new year, now’s the perfect time to review your cybersecurity goals.  Each year cyberthreats increase, causing more and more damage.  Your security program and protection needs to be updated and adjusted accordingly to match these threats, preventing criminals from breaching your company’s security.   There are numerous ways your cybersecurity can […]

Read More… from 7 Cybersecurity Resolutions For 2022 Infographic