Cyber Security Awareness and Vulnerabilities Blog

Image
2021 predictions

Adapting to a Changed World: 6 Cybersecurity Predictions for 2021

Dec 22, 2020
As a new year looms bright with possibility in front of us, how can we prepare for a world that looks profoundly different than it did a year ago? On the cybersecurity front, we can always anticipate continuing battles with familiar foes, as well as a few new challenges on the horizon. Though we may not have a crystal ball, based on our observations and discussions, here are six predictions for the upcoming year.
Image
pen testing for a remote workforce

Finding Clarity in the Chaos: 5 Cybersecurity Trends of 2020

Dec 22, 2020
As 2020 comes to an end and we anticipate gleefully tossing our calendars in the garbage, we can all agree it was one of the most tumultuous years in recent history. It was a difficult time for almost every person and industry, and cybersecurity was certainly no exception, with shocking breaches, mass transitions to remote working, and threat actors thriving as the pandemic raged on. Though we’re as eager as everyone else to look forward, let’s look back at 2020 one more time to identify trends that may help you plan for a better 2021.
Image
segregation-of-duties-in-identity-governance

Why Identity Governance Is Essential for Segregation of Duties (SoD)

Dec 18, 2020
It’s no secret that organizations today face a constant onslaught of identity-related access risks within the current threat landscape. One of the most critical and potentially damaging access risks that can exist under the surface of an organization is the lack of controls to ensure adequate segregation of duties (SoD).
Image
cobalt strike interoperability with core impact thumb

Interoperability with Cobalt Strike and Other Notable New Features in Core Impact 20.3

Dec 11, 2020
The latest release of Core Impact has arrived! Version 20.3 showcases our commitment to creating a comprehensive, streamlined process for testing the defenses of any IT environment. At the forefront of this effort is the debut of exciting new interoperability capabilities with our red teaming platform, Cobalt Strike. Additionally, this latest release includes new features focused on both efficiency and ease of use.
Image
3 Reasons You May Need to Rethink Your Virus Protection Strategy thumbnail

3 Reasons You May Need to Rethink Your Virus Protection Strategy

Dec 8, 2020
These days, encountering malware like viruses, ransomware, trojans, or worms has become all too common—it’s almost an inevitability. In fact, according to the 2020 Malware Report by Cybersecurity Insiders, 88% see malware as an extreme or moderate threat, and 75% believe malware and ransomware will increase in the next year.
Image
A day in the life of a pen tester thumbnail
Image
identity-governance-lock

‘You Can’t Boil the Ocean’: How a Phased Approach Can Help Your IGA Program Succeed

Nov 18, 2020
Implementing an Identity Governance and Administration (IGA) solution can be a daunting task. Organizations of all sizes recognize the complexity of mitigating identity-related access risks across countless devices, applications, and systems, but need a way to see through the competing priorities and to understand that IGA is not an all or nothing proposition. Rather than a destination, Identity Governance and Administration should be viewed as a journey.
Image
Open Source vs. Enterprise: Why Not All Exploits are Created Equal

Open Source vs. Enterprise: Why Not All Exploits are Created Equal

Nov 11, 2020
A common tactic of attackers trying to breach an environment is to use an exploit against a known vulnerability in an application or device present in a targeted infrastructure. Exploiting a vulnerability can provide an attacker with privileges or capabilities they would not normally be granted.
Image
security-locks-with-open-lock

Missing Critical Threats in Your Network? Here’s How to Quickly Detect Active Infections

Nov 2, 2020
Within today’s threat landscape, the regularity of data breaches comes as no surprise. And their impact continues to be far reaching and extremely costly. According to the 2020 Cost of a Data Breach Report conducted by the Ponemon Institute, the average cost of a breach is now $3.86 million and the average time to contain the breach is 280 days. With more than 15 billion records exposed annually, data breaches have significant consequences that can impact organizations negatively for the short- and long-term.
Image
lock-in-city-scape

What You Don’t Know About Access Management Is Hurting You

Oct 20, 2020
The impact of COVID-19 has been far-reaching across nearly every sector. Millions of employees now work remotely, making companies particularly vulnerable when it comes to external access risks. Many organizations lack a centralized process to manage user access to accounts and resources. They often have limited visibility into access levels users possess to data and systems within their network. And they may be quickly adding or changing access levels to meet the needs of their remote workforce.
Image
What is NTA? (thumbnail image)

What is Network Traffic Analysis?

Oct 2, 2020
Network Traffic Analysis (NTA) is a category of cybersecurity that involves observing network traffic communications, using analytics to discover patterns and monitor for potential threats. NTA solutions can be powerful tools for any organization, alerting security teams to an infection early enough to avoid costly damage. However, in today’s threat landscape, there are many different types of cybersecurity solutions, so let’s examine what sets NTA apart, and why you should incorporate it.
Image
financial-services-graphs-computer

Five Major Drivers of IGA and PAM for Financial Services Organizations Today

Sep 25, 2020
Financial services information security continues to be a top priority across the entire financial sector—and for good reason. The Verizon Data Breach Investigations Report found that financial profit or gain was the primary motivation in 71 percent of all information security incidents, making financial services organizations a prime target for attack.
Image
iga-smb-person-at-computer-thumbprint

Three Ways Enterprise-Grade Identity Governance Now Works for Small and Mid-Sized Organizations

Sep 23, 2020
For small and mid-sized organizations, mitigating identity-related access risks may seem like a never-ending struggle they face on their own. Tasked with supporting countless systems, networks, and applications with access to key data, they frequently have limited staff and rely on manual user provisioning and deprovisioning. They may depend on decentralized processes for managing accounts—limiting their visibility into access levels and magnifying access risks across the business.
Image
Identity-Access-Management-Lock-Image

The Intersection of RPA and IGA: Why Automation and Identity Governance Go Hand-in-Hand

Sep 16, 2020
The rise of robotic process automation (RPA) during the last several years has enabled organizations to adopt new technologies that drive efficiencies across their business. RPA solutions leverage software robots that communicate with business systems and applications to streamline processes and reduce the burden on employees for completing mundane, repetitive tasks. Embracing new technologies like RPA has helped organizations transform the way work gets done.
Image
3 Reasons to Use Third Party Testers thumbnail

3 Reasons Every Organization Should Leverage Third-Party Pen Testers

Sep 11, 2020
Penetration testing, also known as a pen test, is a security exercise that reveals an organization’s security vulnerabilities through a defined testing process. A penetration test may focus on networks, applications, physical facilities, individuals, and more.
Image
Password Attacks Thumbnail

6 Ways to Defend Yourself Against Password Attacks

Sep 9, 2020
Ever since Ali Baba uttered “open sesame,” thieves have been using stolen passwords to access hidden riches. In the digital world, password attacks have been and continue to be a common way for threat actors to gain access to an organization’s treasure trove of data. No matter how many emails we get from IT explaining what makes a good password, many of us still use the same basic password in multiple places simply because they’re easier to remember.
Image
How Mature is Your Vulnerability Management Program?

How Mature is Your Vulnerability Management Program?

Sep 2, 2020
Security vulnerabilities are one of the most common problems in cybersecurity today, as they may exist in operating systems, services and application flaws, improper configurations or risky end-user behavior. According to the statistics from the Common Vulnerabilities and Exposures list, 12,174 new vulnerabilities were uncovered in 2019—over 13 times as many as were discovered in 1999, when the database first came into existence.
Image
identity-governance-cloud-image

IGA and the Cloud: What You Need to Know

Aug 28, 2020
With the rise of cloud computing, organizations have expanded their reliance upon cloud platforms. Many have expanded their capabilities and capacity through cloud servers, while others have adopted a hybrid approach that includes both cloud and on-premise environments.
Image
core impact 20.1 blog

5 Most Notable New Features in Core Impact 20.1

Aug 12, 2020
We are so excited about our latest release of Core Impact. Version 20.1 was fueled largely by the valuable and genuine feedback our customers have shared with us. This release was jam packed with new features, including several new additions that offer added convenience and increased usability. To recap, we thought it would be helpful to highlight the top 5:
Image
How to Select the Right Third-Party Pen Testing Service

How to Select the Right Third-Party Pen Testing Service

Jul 28, 2020
As both cybersecurity breaches and compliance mandates increase, third-party pen testing services are no longer seen as optional. These teams specialize in ethical hacking that gives organizations insight into possible security weaknesses and attack vectors in their IT environment. Being in such high demand, more and more testing services are emerging, presenting businesses with a new challenge of selecting which service to use. How do you know which one is right for you?
Image
man-at-computer-with-locks

What’s the Difference Between IAM, IGA, and PAM?

Jul 24, 2020
The identity security landscape has transformed considerably within the last two decades. And for good reason. Mitigating identity-related access risks has become essential as companies face threats every day, from virtually everywhere.