Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

February 2024

Accelerate SOC Maturity with Threat Hunting

SOC leaders who got their start in security 10 or 20 years ago have witnessed an incredible evolution of cyber attacks. Those who have failed to keep up find themselves operating in an unrecognizable sea of advanced adversaries. All kinds of organizations across every industry are struggling to maintain their pace on the rapid timeline that threat actors have set for them.

How To Create a New Branch In GitHub?

Managing different features and fixes without tangling the core code is crucial. This is where the understanding of branching in GitHub enters the chat. Think of a branch in GitHub as a parallel universe for your project, where you can experiment, develop, and refine new features or fixes, all without impacting the main codebase. It’s a fundamental practice that not only keeps your project organized but also creates a flexible and collaborative development environment.

Mastering Access Management: Your Essential Guide to Effective IAM Solutions

As cybersecurity threats evolve, how can your organisation stay shielded while ensuring staff efficiency? Access management is the cornerstone of a secure digital environment, balancing critical data protection with essential user accessibility. In this article, we will guide you through strategic insights and practical steps to bolster your enterprise’s defences with robust Identity Access Management (IAM) solutions.

10 Key Steps to Enhance Mobile Application Security in 2024

In today's digital landscape, ensuring robust security for your mobile applications is paramount. With attackers constantly evolving their techniques and targeting vulnerabilities, adopting DevSecOps is more important than ever, and it is part of any solid program of adding proactive measures to safeguard your mobile apps.

Forward Networks has teamed up with NetBox Labs to lower the barriers to adopting network automation

NetBox Labs, is the open-source startup behind NetBox, a tool designed specifically for network engineers and operators. It combines the functionalities of IP Address Management (IPAM) and Data Center Infrastructure Management (DCIM) into a unified solution. With this relationship, Forward Enterprise and NetBox Cloud customers: The relationship includes a joint effort to build a bi-directional integration between Forward Enterprise and NetBox.

How federal agencies can build their zero trust security tech stack

Few would argue that zero trust has become one of the most important principles of modern cybersecurity programs. But ever since the concept of zero trust security was first popularized by Forrester in 2009, many federal government agencies in the United States (along with private sector companies) have struggled to understand its requirements and implement it effectively. Critically, zero trust does not represent a single security method or a type of technology.

Tiered KYC in Indian Payment Banks: Boosting Financial Inclusion

In India’s dynamic digital finance landscape, Payment Banks play a crucial role in extending banking services to the underbanked and unbanked populations. These banks are at the forefront of a financial revolution, aiming to secure and authenticate transactions through the stringent Know Your Customer (KYC) mandates set by the Reserve Bank of India (RBI).

SOC 1 vs SOC 2: Everything you need to know about the SOC attestations

Service organizations often undergo SOC (Service Organization Control) attestation to assure clients and stakeholders of the effectiveness of their internal controls. Two prominent frameworks within the SOC domain are SOC 1 and SOC 2, each designed to address specific facets of a service organization’s controls. Read on to learn how to compare SOC 1 vs SOC 2 attestations.

#100 - A tale of two breaches: examining the AnyDesk & Cloudflare incidents

In this episode of The Cybersecurity Defenders Podcast, we take a close look at the AnyDesk and Cloudflare breaches that were both disclosed on February 2, 2024. AnyDesk, a prominent remote desktop software provider, disclosed a cyberattack late on February 2nd, causing the company to enforce strict security measures for nearly a week. Adversaries breached AnyDesk's systems, compromising vital assets such as source code and private code signing keys, and gaining unauthorized access to production systems.

Browser-Based Phishing Attacks Increase 198%, With Evasive Attacks Increasing 206%

A new report shows massive increases in browser attacks in the second half of 2023, with over 31,000 threats specifically designed to bypass security solution detection. I spend a lot of time on this blog talking about phishing, social engineering, smishing, deepfakes and more – all topics centered around attack techniques designed to interact and fool a user.

Your Data Has Moved to the Cloud - Can Your Security Strategy Keep Up?

In today's world, data is the lifeblood of every organization. From intellectual property to employee and customer data to competitive intelligence and more — if your data is stolen, it's your reputation, money, and business on the line. But the way we store and interact with data has changed over the years. It's no longer located inside a perimeter, on networks and devices your organization has total control over.