From the Fall 2022 Issue

Cybersecurity Threats: How to Monitor For and Report Them

Author(s):

Shannon Walker, Founder and President, Whistleblower Security Inc.

Cybersecurity Threats

Businesses face the threat of potential cyber-attacks every day. Whether they are large or small, companies are exposed to risks from hackers wanting to steal sensitive data or disrupt operations. Consider the following cases. In 2015, Dr. David Kreir’s small business, Volunteer Voyages, incurred $14,000 in fraudulent charges after a thief stole their online debit … Read more

From the Summer 2022 Issue

Securing APIs Through External Attack Surface Management (EASM)

Author(s):

Phillip Wylie, Manager of Tech Evangelism & Enablement, CyCognito

Securing APIs-Phillip Wylie

As cybersecurity teams work tirelessly to secure their computing environments and stay ahead of risks, two areas that stand out are external attack surfaces and Application Programming Interfaces (APIs). These two areas are not new but have been overlooked or not adequately addressed. Attack surfaces, internal and external, have been around a long time. APIs … Read more

From the Spring 2022 Issue

Playing Offense and Defense with Drone Cybersecurity Threats

Author(s):

Kate Esprit, Cyber Threat Intelligence Analyst, MITRE

TBONE, Tesla, and Technological Threats In October 2016, U.S.-based vehicle manufacturer Tesla received some surprising news – two German security researchers had found a way to hack the company’s cars using a drone. The researchers, Ralf-Philipp Weinmann and Benedikt Schmotzle had hacked into Tesla’s systems by exploiting several zero-click vulnerabilities in the ConnMan software, an … Read more