A North Korean hacker, using a deep-faked identity,was hiredby the U.S. cybersecurity firm KnowBe4. Shortly after receiving his workstation, the hacker used a virtual private network (VPN) and Raspberry Pi to download malware and make unauthorized changes, but the attempt was quickly detected and thwarted without impacting the firm's systems, as CEO and founder Stu Sjouwerman explained in apost. This is not the first and won't be the last time something like this happens. Know your threat vectors in all areas of your business.
Insight #2
Identifying rules and procedures for accessing an organization's IT resources is essential for security, especially with expanded IT infrastructures and remote work models. Key policies, according toCSO Online, include acceptable use policies to ensure proper use of IT assets, artificial intelligence (AI) use policies to manage risks with AI tools, data management policies to protect sensitive information, incident response policies to manage cybersecurity incidents and hybrid/remote access policies to secure remote work environments.
Insight #3
Leidos Holdings Inc., a major IT service provider for the U.S. government, experienced asignificant cybersecurity breach, leading to the leakage of internal documents. This incident, yet another involving a major IT service provider, has raised concerns about the security of sensitive government data managed by third-party contractors, as the leaked documents were found on a cybercrime forum and include various sensitive files.
David is an experienced application security professional with over 20 years in cybersecurity. In addition to serving as the chief information security officer, David leads the Contrast Labs team that is focused on analyzing threat intelligence to help enterprise clients develop more proactive approaches to their application security programs. Throughout his career, David has worked within multiple disciplines in the security field—from application development, to network architecture design and support, to IT security and consulting, to security training, to application security. Over the past decade, David has specialized in all things related to mobile applications and securing them. He has worked with many clients across industry sectors, including financial, government, automobile, healthcare, and retail. David is an active participant in numerous bug bounty programs.
Get the latest content from Contrast directly to your mailbox. By subscribing, you will stay up to date with all the latest and greatest from Contrast.