Cyber Defense Advisors

News

  • by
  • December 18, 2023

Unmasking the Dark Side of Low-Code/No-Code Applications

Low-code/no-code (LCNC) and robotic process automation (RPA) have gained immense popularity, but how secure are they? Is your security team paying enough attention in an era of rapid digital transformation, where business users are empowered to create applications swiftly using platforms like Microsoft PowerApps, UiPath, ServiceNow, Mendix, and OutSystems? The simple truth is often swept […]

Cyber News

Simplify Your Business Continuity Programs

Simplify Your Business Continuity Programs In an ever-changing world filled with uncertainties, the need for robust business continuity programs has never been more critical. Whether it’s a natural disaster, a cyberattack, or a global pandemic, organizations must be prepared to navigate disruptions and ensure the continuity of their operations. However, as the complexity of these […]

Business Continuity Program

Silicon Valley Shakeups: The Tech Behind Mergers & Acquisitions and Carveouts

Silicon Valley Shakeups: The Tech Behind Mergers & Acquisitions and Carveouts Silicon Valley has long been the epicenter of technological innovation, where startups blossom into industry giants, and established players constantly seek ways to stay at the cutting edge. In this fast-paced environment, mergers, acquisitions, and carveouts have become integral strategies for companies looking to […]

Technology Careveout, Mergers & Acquisitions

ITIL Compliance in a DevOps World: Reconciling Speed and Stability

ITIL Compliance in a DevOps World: Reconciling Speed and Stability In the ever-evolving landscape of IT and software development, two seemingly contradictory forces have emerged as dominant paradigms: ITIL and DevOps. On one hand, ITIL (Information Technology Infrastructure Library) is a framework that promotes stability, reliability, and compliance. On the other hand, DevOps is all […]

ITIL Compliance
  • by
  • December 18, 2023

QakBot Malware Resurfaces with New Tactics, Targeting the Hospitality Industry

A new wave of phishing messages distributing the QakBot malware has been observed, more than three months after a law enforcement effort saw its infrastructure dismantled by infiltrating its command-and-control (C2) network. Microsoft, which made the discovery, described it as a low-volume campaign that began on December 11, 2023, and targeted the hospitality industry. “Targets […]

Cyber News
  • by
  • December 18, 2023

CISA Urges Manufacturers Eliminate Default Passwords to Thwart Cyber Threats

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is urging manufacturers to get rid of default passwords on internet-exposed systems altogether, citing severe risks that could be exploited by malicious actors to gain initial access to, and move laterally within, organizations. In an alert published last week, the agency called out Iranian threat actors affiliated […]

Cyber News

How CCPA Compliance Can Help Keep Your Company Secure

How CCPA Compliance Can Help Keep Your Company Secure In an era defined by data, the security and privacy of personal information have never been more critical. As businesses collect and process vast amounts of customer data, the need to protect that data from potential threats has become paramount. One key piece of legislation that […]

CCPA Compliance

Harmony in Tech: How ITIL Compliance Streamlines Modern IT Ecosystems

Harmony in Tech: How ITIL Compliance Streamlines Modern IT Ecosystems In an era where technology permeates every facet of our lives, from smartphones in our pockets to cloud-based software powering businesses, achieving harmony in the ever-evolving IT landscape is paramount. This harmonious state, where technology seamlessly aligns with business goals and customer needs, can be […]

ITIL Compliance

Guided by Standards: The Vital Role of NIST-Based Risk Assessments in Modern Cyber Defense

Guided by Standards: The Vital Role of NIST-Based Risk Assessments in Modern Cyber Defense In an increasingly interconnected world, where data flows seamlessly between devices, organizations, and individuals, the importance of robust cybersecurity practices cannot be overstated. The digital landscape is rife with potential threats, from malicious hackers seeking to breach sensitive information to ever-evolving […]

NIST-Based Risk Assessment