Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

March 2024

Commercial spyware: The stealthy threat

It can be difficult to over-estimate the benefits that we accrue from the use of technology in our day to day lives. But these benefits have come at a price which has redefined what we expect in terms of privacy. As a member of Generation X, which came of age at the dawn of the Internet era and witnessed the rise of an entire industry built on consumer information analytics, I have on occasion struck my own Faustian bargains, offering up my personal data in exchange for convenience. As have we all.

Getting to Hello SAML Jackson - Installing BoxyHQ SAML Jackson #opensource

Dive into a comprehensive walkthrough of setting up SAML Jackson, an open-source project by BoxyHQ that simplifies enterprise SSO and directory sync. This video also covers the enhancements made to the README to get you from Zero to Hello SAML Jackson! as quickly as possible.

How to Modernize Your AD Instance

Whether you want to extend your Active Directory instance to support additional capabilities, need to prepare for an eventual migration without replacing your current implementation, or are ready to move away from AD completely, we've built a roadmap for you. Find your path to modernizing Active Directory by following along with the journeys of Tyrone, Kate, and Eric, fictional IT professionals navigating three different real-world situations where AD needs an update. Grab your copy for detailed insights on the different ways you can prepare your organization to modernize AD.

State of IT 2024

2023 was a year of wild transformation, most notably with huge advances in the availability of AI technologies, persistent security threats, and economic uneasiness. But how will this affect IT professionals in the field in 2024? In this edition of the biannual SME IT Trends Report, JumpCloud surveyed 1200+ IT professionals across the U.S., U.K., and India for insights on how the industry is faring, how others working in IT are preparing for 2024, and quantitative data on IT budgets, OS usage, AI adoption, and more.

Snyk users don't have to worry about NVD delays

You may have encountered recent discussions and the official notice from NVD (National Vulnerability Database) regarding delays in their analysis process. This message was posted on the February 13: We want to assure you that these delays do not compromise the integrity or efficacy of Snyk's security intelligence, including the Snyk Vulnerability Database.

AnyDesk Case: What steps should users take to protect themselves?

On February 2, the popular remote access tool AnyDesk disclosed that it had suffered a cyberattack that had compromised its production systems. Although AnyDesk has not revealed specific details about the root cause of the attack, the measures taken to mitigate it, such as mandatory password resets and code signing certificate renewals, suggest that cybercriminals gained access to user passwords and the company's code signing certificate.

Post-SOC 2 Gap Analysis: Next Steps for Full Compliance

Achieving SOC 2 compliance demonstrates to customers that your organization takes data security and privacy seriously. The journey to achieve SOC 2 compliance, however, is not easy. For example, when you perform a preliminary assessment to determine your current state of security, you’re likely to find multiple gaps between that current state and what SOC 2 standards expect you to have. You’ll need to close those gaps to achieve full SOC 2 compliance.

Strategic Skill Building: The Business Approach of Mercenary Groups in Modern Warfare

Explore the strategic approach of mercenary groups in modern warfare in our latest video. Discover how these organizations are investing in upskilling their personnel to ensure they have the expertise and tools necessary for successful operations. Join the conversation as we delve into the parallels between running a business and managing a mercenary group, and the importance of building trust with clients, even if they happen to be nation-states.

Navigating Security Risks and Innovations in the Hospitality Industry

As technology has become available, the hospitality industry has focused on making the most out of innovations such as contactless services and eco-friendly practices. The era of mobile and contactless services has ushered in a new normal for hospitality organizations, offering guests seamless experiences with a simple tap of their smartphones.

25 Essential Cybersecurity tips and best practices for your business

Cybercrime is quickly becoming one of the biggest threats worldwide, impacting businesses across all sectors. To avoid the risk of a damaging security breach, it's crucial to stay updated on the latest cybersecurity tips and practices. Protecting yourself or your business from cyberattacks can be tough. But there are several cybersecurity tips that can help defend against attacks. We've gathered a list of 25 most effective tips for you to adopt and share with others.