The Unit 42 Threat Intelligence team discovered Azurescape - the first known cross-account container takeover in the public cloud affecting Azure Container Instances.
A critical security vulnerability has been disclosed in HAProxy that could result in unauthorized access to sensitive data and execution of arbitrary commands.
There are three foundational pillars to fostering a cyber-engaged workforce: employee engagement, executive leadership engagement and peer network engagement.
Three in four organizations are currently utilizing a hybrid work model. Employers and employees alike feel this is the best path moving forward. However, only roughly one in five companies (21%) are fully confident their infrastructure security can support long-term remote work.
Devin Ertel has been appointed Chief Information Security Officer (CISO) at Menlo Security, where he will spearhead global efforts to reduce the company’s risk and security exposure.
While forensic tools are potent weapons in the cyber world, on their own, they’re not enough to overcome the challenge of data sets growing in complexity and volume. Enter artificial intelligence.
The Cybersecurity and Infrastructure Security Agency (CISA) released the Cloud Security Technical Reference Architecture (TRA) and Zero Trust Maturity Model for public comment.
Microsoft is currently investigating reports of a remote code execution vulnerability in MSHTML that affects Microsoft Windows. The exploitation of this vulnerability may allow a remote attacker to take control of an affected system. In addition, this vulnerability has been detected in exploits in the wild.
How CISOs approach technologies and hiring decisions will go a long way in determining how their security posture evolves this year and beyond. There’s an important balance to strike between the two, and you can’t determine the right mix without taking a step back to understand the business itself.