Our latest Fortify Employee Spotlight highlights Jan Wienand, Security PreSales Consultant for CyberRes. Jan supports enterprise customers as well as small and medium-sized companies from the DACH region in exciting application security projects.
Raveed Laeb, Vice President of Product for KELA, a cyber intelligence technology company, gives us a behind-the-curtain view of the world of cybercriminals in the latest Reimagining Cyber podcast, “Inside cybercrime with Raveed Laeb.”
Cyber insurance brokers must play an active role in ensuring those seeking to be insured have adequate cybersecurity controls, such as multi-factor authentication (MFA), to mitigate cyber risk and reduce the likelihood of claims.
Using older vulnerabilities is common practice among attack groups, a trend that companies should take into account as they triage and remediate software vulnerabilities. In some cases, organizations did not prioritize the vulnerability properly, allowing attackers to exploit the security weakness. In other cases, organizations may not have even known that they had a vulnerable asset.
Zero Trust is not a new concept, but the name may be. Zero Trust is a strategic approach to cybersecurity that secures an organization by eliminating implicit trust and continuously validating every stage of a digital interaction. But Zero Trust also is used in the physical world and has be seen, although perhaps not noticed, in action by anyone who has travelled through an airport.