Author: HackWatchit

Socure announced its new RiskOS platform. RiskOS builds on Socure’s strategic acquisition of Effectiv by integrating its sophisticated orchestration and decisioning engine with Socure’s identity verification and fraud prevention solutions powered by its identity graph. As fraud continues to cost businesses hundreds of billions each year, fragmented strategies and isolated point solutions are no longer enough to combat increasingly sophisticated fraud tactics and evolving regulatory pressures. RiskOS transforms risk decisioning delivering by processing tens of thousands of real-time computations per second and launching with over 50 pre-integrated third-party data solutions. Streamlining risk, fraud, and compliance operations through its no-code interface, making rule changes,…

Read More

Just a few weeks into the new administration, we are already seeing a glimpse of how cybersecurity will be evolving in the year ahead. Similar to the predictions of many of my colleagues, it should come as no surprise that artificial intelligence (AI) will continue dominating headlines and drive White House policy activity. Yet despite the associated frenzy, I am confident this landmark technology will be a positive forcing function for many organizations and one that helps leverage new and existing collaborations. Based on the early moves of the Trump administration, I’d expect our adversaries to heavily leverage cyberespionage to…

Read More

Since password managers store highly sensitive data such as account logins, payment information, and other personal records, it’s natural to wonder if they are safe and how well they protect your information. In short, password managers can be safe as long as you choose your provider carefully and follow security best practices. In this article, we’ll cover the various types of password managers and how they keep your info secure. We’ll also dive into their benefits and drawbacks and list some trustworthy providers. Finally, we’ll discuss whether free password managers are worth it and answer some FAQs. How do password…

Read More

This webcast was originally aired on January 16, 2025. In this video, Kelli K. Tarala and CJ Cox discuss the challenges and strategies for improving governance, risk, and compliance (GRC) within organizations. They explore how to effectively build relationships, communicate value, and leverage technology to streamline compliance processes. Through shared experiences and insights, they emphasize the importance of prioritizing GRC efforts to reduce risks and enhance business operations, while also addressing common misconceptions and resistance faced by GRC professionals. Governance, Risk, and Compliance (GRC) professionals often face the perception of being obstacles to business operations, but the focus should be…

Read More

Key Findings 2024 was the year cyber threats got quicker. Cyber attackers really picked up the pace, executing faster, more efficient breaches that pushed traditional defenses to their limits. Our research reveals 2024 saw a 22% increase in attack speed compared to 2023, with the fastest incident achieving lateral movement in just 27 minutes. This quicker infiltration leaves organizations with even less time to respond, making automated defenses crucial in matching—and surpassing—the speed of adversaries. We’ve identified three main factors driving faster attack speeds: Increased Activity by IABs: Initial access brokers (IABs) are capitalizing on the surge in information-stealing malware…

Read More

The world of cybersecurity is a constant battleground, with new threats emerging all the time. For Chief Information Security Officers, staying ahead of the curve requires a blend of technical expertise, and a strategic and adaptable mindset. This blog outlines some best practices for navigating the ever-changing Information Security landscape. 1. Embrace Agility Agility in information security means being able to respond to new threats swiftly and efficiently. It requires a dynamic approach where security measures are continuously evaluated and improved. A rigid security strategy can be a significant liability. The most effective CISOs are those who can adapt the…

Read More

Decision Tree algorithms have always fascinated me. They are easy to implement and achieve good results on various classification and regression tasks. Combined with boosting, decision trees are still state-of-the-art in many applications. Frameworks such as sklearn, Lightgbm, xgboost and catboost have done a very good job until today. However, in the past few months, I have been missing support for arrow datasets. While lightgbm has recently added support for that, it is still missing in most other frameworks. The arrow data format could be a perfect match for decision trees since it has a columnar structure optimized for efficient…

Read More

Today’s business environment requires teams to do more — better than before, and at a faster rate. Thanks to third-party apps, no-code platforms, GenAI, and other forms of automation and integration, enterprises are able to achieve that, but not without a deeply-embedded reliance on the true building blocks of automation and integration — non-human identities (NHIs). These NHIs (i.e. bots, API keys, service accounts, OAuth tokens) are critical to innovation and efficiency yet remain the biggest security blind spot, hence the recent headline-grabbing attacks like the ones on AWS, Microsoft, Cloudflare, and Okta, to name a few. The growing frequency…

Read More

The transformative potential of artificial intelligence (AI) is both exhilarating and daunting. The 2024 NetApp Data Complexity Report underscores a pivotal reality: While AI offers unprecedented opportunities, it also introduces significant challenges, particularly in data privacy and security. AI Adoption: A Double-Edged Sword The rapid integration of AI into business operations has been a catalyst for innovation, driving efficiency and uncovering new avenues for growth. However, this swift adoption has not been without repercussions. According to the report, 41% of global tech executives anticipate a significant increase in security threats by 2025 due to AI advancements. This statistic is a clarion call…

Read More