Category: Security Boulevard

Insider Risk Digest: May

This Article Insider Risk Digest: May was first published on Signpost Six. | https://www.signpostsix.com/ Welcome to this month’s Insider Risk Digest. This edition reveals a University of Florida professor and students involved in a scheme to ship illicit substances to…

What is an IS (RBI) Audit?

RBI has issued comprehensive master directions and guidelines for banks and non-banking financial corporations to identify and address operational risks and weaknesses. These guidelines are based on recommendations from working groups focused on information security, e-banking, governance, and cyber fraud.…

Understanding Credential Phishing

Credential phishing is a type of cyberattack where attackers attempt to deceive your employees into providing their sensitive information, such as their Microsoft usernames and passwords. What is not obvious is credential phishing is the root cause of many breaches,…

Adaptive DDoS Defense’s Value in the Security Ecosystem

As DDoS attackers become more sophisticated and the attack surface grows exponentially, businesses must expand beyond an ideology of prevention to include a focus on early detection and response. The post Adaptive DDoS Defense’s Value in the Security Ecosystem appeared…

USENIX Security ’23 – zkSaaS: Zero-Knowledge SNARKs as a Service

Authors/Presenters: Sanjam Garg, Aarushi Goel, Abhishek Jain, Johns Hopkins University; Guru-Vamsi Policharla, Sruthi Sekar Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events…

Part 13

On Detection: Tactical to Functional Why a Single Test Case is Insufficient Introduction In my previous post, I explored the idea that different tools can implement the same operation chain (behavior) in various ways. I referred to these various ways…

TrustCloud Product Updates: May 2024

This month we have something big: Our new Third Party Risk Assessment app, TPRA. And it’s now available to current customers! Observable third-party risk assessments  Vendor assessments are a huge part of any GRC program, so it only makes sense…