article thumbnail

Whitepaper: The Intersection of Technical Debt and Cybersecurity

Approachable Cyber Threats

To help organizations solve this challenge, Hive Systems and BARR Advisory partnered on an in-depth whitepaper to explore the intersection of cybersecurity and technical debt. With such a wide net, understanding how technical debt impacts your business and cybersecurity efforts can be a challenge.

article thumbnail

10 Lessons Learned from the Top Cyber Threats of 2021

Security Boulevard

We published a whitepaper about Tactics, Techniques, and Procedures (TTPs) and also tools utilized by the DarkSide threat actors. . The post 10 Lessons Learned from the Top Cyber Threats of 2021 appeared first on Security Boulevard. Most notably, US-based Colonial Pipeline Company paid 4.4 Lessons Learned: 3.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Stay Ahead of Cyber Threats with Autonomous Penetration Testing

Security Boulevard

The post Stay Ahead of Cyber Threats with Autonomous Penetration Testing appeared first on Horizon3.ai. The post Stay Ahead of Cyber Threats with Autonomous Penetration Testing appeared first on Security Boulevard.

article thumbnail

MITRE introduces D3FEND framework

Malwarebytes

D3FEND enables cybersecurity professionals to tailor defenses against specific cyber threats, thereby reducing a system’s potential attack surface.”. The “tailor defenses against specific cyber threats” immediately gave me the mental image of a game of whack-a-mole.

article thumbnail

MalwareBazaar – welcome to the abuse-ch malware repository

Security Affairs

The purpose of the project is to collect and share malware samples, helping IT-security researchers and threat analyst protecting their constituency and customers from cyber threats.” “As many IT-security researchers, I’m heavily using public available information (OSINT) for hunting down new cyber threats. .

Malware 82
article thumbnail

From a tech explosion to accidental cyberattacks, researchers offer a glimpse into 2030

SC Magazine

The researchers presented Monday afternoon at the RSA Conference, to tease a soon-to-be-released whitepaper of their work. The project is based on work Baines did for Europol’s Cyber Crimes Center, Project 2020, which made a similar series of predictions in 2013 targeting last year.

article thumbnail

Augmenting Legacy Controls with AI-driven Threat Detection and Response

Security Boulevard

As organizations grapple with the limitations of legacy security controls in the face of increasingly sophisticated cyber threats, integrating AI-driven threat detection and response capabilities presents a compelling opportunity to bolster their defenses.