Big data has made the field of cybersecurity a lot more complicated. On the one hand, many cybersecurity professionals are using big data technology to fortify their defenses and more easily respond to cybersecurity threats. Unfortunately, hackers have access to the same technology. They are using big data to orchestrate more viscous attacks than ever […]
Illusive Spotlight automatically and continuously discovers and mitigates privileged identity risks, while Illusive Shadow protects against identity risks that can't be readily remediated.
The new Cryptocurrency Investigations and Compliance services positions the firm to help law enforcement agencies, financial institutions, and private clients lift the veil on crypto transactions.
The ubiquity of open source software presents a significant security risk, as it opens the door for vulnerabilities to be introduced (intentionally or inadvertently) to those who use it.
Intro The SafetyDetectives security team discovered a data breach affecting the French children’s fashion e-commerce website melijoe.com. Melijoe is a high-end children’s fashion retailer based in France. An Amazon S3 bucket owned by the company was left accessible without authentication controls in place, exposing sensitive and personal data for potentially hundreds of thousands of customers. Melijoe […]
The recent Equifax data breach has online payment fraud and credit fraud prevention top of mind for many, and rightfully so: besides the massive identity theft affecting 143 million consumers, more than 200,000 credit card numbers were stolen.
These days, businesses all around the world have come to depend on cloud platforms for a variety of mission-critical workflows. They keep their CRM data in the cloud. They process their payrolls in the cloud. They even manage their HR processes through the cloud. And all of that means they're trusting the bulk of their privileged business data to those cloud providers, too.
And while most major