Sander Vinberg - Senior Threat Evangelist - F5-Labs - Cybersecurity - Data backup - Application isolation - sandboxing - Network segmentation - Privileged account management - Code signing - Tecxhmedia

Cybersecurity mitigations no organisation can afford to ignore

Code signing is another underused approach, in light of architectural trends that pull code from disparate sources at runtime. In particular, sub-resource integrity (SRI) headers can ensure that external scripts haven’t been modified when they are called at runtime. As applications increasingly rely on external scripts to pull in new features, SRI is a powerful tool to shut down vectors.

Continue Reading
Tom Kellermann - head of cybersecurity strategy - VMware - fifth annual Modern Bank Heists report -financial industry - Cybercriminals - techxmedia

Cybercriminals increasingly targeting financial industry, reveals VMware

The report also discovered that once cybercriminals gain access to a financial organization, they are no longer looking for wire transfers or capital, as was previously assumed. Cybercriminal cartels are now looking for non-public market data such as earnings estimates, public offerings, and significant transactions. In fact, two out of every three (66 percent) financial institutions were subjected to attacks aimed at market strategies.

Continue Reading