Best Practices
Hundreds of Clusters Attacked Due to Unpatched Flaw in Ray AI Framework
Thousands of servers running AI workloads are under attack by threat actors exploiting an unpatched vulnerability in the open-source Ray AI framework – widely used by such companies as OpenAI, Uber, Amazon, ...
Security Boulevard
Macro Segmentation vs. Micro Segmentation
Nik Hewitt | | advice, Best Practices, Cybersecurity, microsegmentation, network segmentation, next gen security, security, Security Research, zero trust
Understanding the distinction between macro segmentation vs. micro segmentation, and making the right choice Within network security segmentation, macro segmentation vs. micro segmentation are crucial methods to consider for organizations aiming to ...
CVE-2023-48788 Vulnerability Reported in FortiClientEMS
Fortinet’s FortiClient EMS product exploited via CVE-2023-48788, a critical SQL injection vulnerability : OFFICIAL CVE-2023-48788 PATCHING INFORMATION : The CISA (Cybersecurity and Infrastructure Security Agency) has alerted organizations to actively exploit ‘The ...
How to Get the Most From Your Secrets Scanning
Secret scanning is essential for unlocking next-level software supply chain security. Get tips & best practices for optimal secret scanning to secure your code ...
Top Ten NSA and CISA Cloud Security Strategies
Nik Hewitt | | advice, Best Practices, Cloud, Cybersecurity, Kubernetes Security, microsegmentation, next gen security, security, Security Research, TrueFort, zero trust
NSA and CISA release a joint guide outlining ten pivotal cloud security strategies for enterprise In a business world dominated by cloud-based solutions, robust cloud security strategies for cloud environments have never ...
GUEST ESSAY: NIST’s Cybersecurity Framework update extends best practices to supply chain, AI
The National Institute of Standards and Technology (NIST) has updated their widely used Cybersecurity Framework (CSF) — a free respected landmark guidance document for reducing cybersecurity risk. Related: More background on CSF ...
How To Respond To An AWS Key Honeytoken Trigger: A Detailed Guide
Learn how to effectively respond to an AWS key honeytoken trigger with this step-by-step guide. Investigate the incident, identify the leak source, secure your environment, and leverage OSINT techniques to protect your ...
EPA and White House Send Water Industry Cybersecurity Warning
Nik Hewitt | | advice, Best Practices, Cybersecurity, next gen security, security, Security Research
The Biden administration issues a cybersecurity call to action for the US water industry amid flood of cyber threats targeting essential systems This directive (see the official guidance) comes in the wake ...
Implementing Scrum for Cybersecurity Teams
Nik Hewitt | | advice, Best Practices, Cybersecurity, next gen security, security, Security Research, TrueFort
How can cybersecurity teams adopt Scrum for agile and responsive best practices? Staying ahead of cybersecurity threats requires cutting-edge technology and agile and effective management practices. Enter Scrum, a framework initially designed ...
Cloud Repatriation Impacts on Resources and Cybersecurity
Nik Hewitt | | advice, Best Practices, Cloud, Cybersecurity, lateral movement, microsegmentation, next gen security, security, Security Research, visibility, zero trust
The cloud repatriation surge and the impact on SOS resources and business cybersecurity In recent years, the cloud computing landscape has witnessed a significant yet somewhat surprising trend: cloud repatriation. This movement ...