Browser Security: A Primer In most organizations, the web browser remains the most commonly used and least governed application in the enterprise. While most security programs treat it as a utility, attackers treat it as a platform. The browser now sits between the user, their credentials, sensitive data, SaaS applications, and critical business workflows. (more...) The post A Primer to Browser Security appeared first on HALOCK.| HALOCK
As organizations build increasingly complex AI ecosystems, agentic architectures have emerged as a powerful approach. These systems involve multiple autonomous agents interacting to plan, delegate, and execute tasks. This interaction between agents is called agent-to-agent (A2A) communication. The Model Context Protocol (MCP) is an emerging convention for structuring how language models call tools, APIs, (more...) The post Securing Agent-to-Agent (A2A) Communication: MCP, A2A, and How Not to ...| HALOCK
Insurance has been targeted before and hit hard. Incidents like Anthem and CNA proved the sector holds valuable data and makes for a high-leverage target. But up until recently, the focus was elsewhere: retail, healthcare, critical infrastructure. Now the pendulum is swinging back. Threat groups are returning to insurance with new tactics and sharper focus. (more...) The post Insurance in the Crosshairs: Renewed Threats and What to Do About Them appeared first on HALOCK.| HALOCK
Threat Exposure Management (“TEM”) is a term that Gartner introduced in their publication “Emerging Tech Impact Radar: Preemptive Cybersecurity” (Castillo, 2024). Since that initial publication, multiple existing and new technical solutions have been categorized and placed under the TEM umbrella. This has resulted in market confusion about what the capabilities TEM solutions should provide and (more...) The post Threat Exposure Management – What it is and what problems does it s...| HALOCK
Few words strike fear within IT departments like ransomware. The thought of a successful ransomware attack is enough to keep CIOs and cybersecurity leaders up at night. To address these fears, cybersecurity product vendors spend a lot of time touting their tools as the latest weapon against ransomware. Despite all the attention and| HALOCK
How do today's hacks measure up to the biggest hacks of all time? Depends on if you use fiat or BTC. Here's a look back...| Casa Blog
Anyone that underestimates the magnitude of the online credential compromise must consider the recent discovery of 16 billion exposed login credentials. Yes, that is ’billion’ with a ‘b’. The large find is made up of at least 30 massive datasets with each one containing anywhere from tens of millions to over 3.5 billion records. The| HALOCK
Description The New York Attorney filed a lawsuit against multiple insurance companies that allegedly failed to protect the personal information of New York drivers from being compromised in cyberattacks. The timeline of the events involving the breach incidents is as follows: August 2020 - The first attack against the National General insurance company October 2020| HALOCK
As organizations continue to shift toward cloud-first, hybrid work environments, the limitations of traditional perimeter-based security have become more apparent. The convergence of Zero Trust Architecture (ZTA) and Secure Access Service Edge (SASE) is no longer just a theoretical security model - it’s| HALOCK