White Papers & Advisories
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
LockBit remains a highly active and sophisticated ransomware threat, targeting various critical infrastructure sectors globally. This updated advisory incorporates recent developments in LockBit's activities, including new victim profiles, evolving Tactics, Techniques, and Procedures (TTPs), and exploited vulnerabilities. By understanding these updates, organizations can strengthen their defenses and respond effectively if targeted.
Preventing Inadvertent Leaks of Sensitive Files from Application Servers
Inadvertent exposure of sensitive data, including configuration files, binaries, service credentials, usernames, passwords, or even .zip files containing critical information, is a growing concern. This issue often stems from something other than the sophisticated tactics of cybercriminals but from misconfigurations within an organization's own IT infrastructure. Specifically, Continuous Integration/Continuous Deployment (CI/CD) pipelines, a backbone of modern DevOps practices, can inadvertently become conduits for such exposures. This article explores how misconfigurations in various aspects of IT operations can lead to the unintended leakage of sensitive data and outlines steps to mitigate these risks.
Continuous Threat Exposure Management: A Critical Enabler for the Cybersecurity Mesh Architecture
In the fast-paced world of cybersecurity, organizations are continuously searching for innovative methods to protect their valuable data and assets. With cyber threats becoming more advanced and widespread, the traditional security model based on perimeters has proven to be ineffective. To address these challenges, Gartner has introduced the concept of the Cybersecurity Mesh Architecture (CSMA), a framework that aims to revolutionize cybersecurity by 2026. Within this transformative framework, Continuous Threat Exposure Management (CTEM) emerges as an integral element that enables the identification, assessment, and mitigation of cyber threats.
No results found.
Please try different keywords.
Showing 12 of 24 blog posts