Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

March 2024

Double Glazing for Extra Security: Enhancing Home Protection

Opting for double glazing can make all the difference. The added layer not only enhances insulation but also provides extra security against potential intruders. With double glazing, you get the best of both worlds - a cozy living space and peace of mind knowing your home is well-protected. Say goodbye to drafts and hello to a safer haven with this simple yet effective solution.

Why is regular access certification your secret weapon against data breaches?

In the ever-evolving realm of cybersecurity, where threats loom large and breaches are a constant concern, the practice of granting always-on or standing privileges to user accounts presents an alarming vulnerability for any organization. This vulnerability is underscored by findings from Verizon’s 2023 data breach incident report, which states that 74% of all data breaches occur due to privilege misuse or stolen credentials.

Initial Access Brokers Explained

Initial access brokers (IABs) form a key part of the cybercriminal ecosystem. They facilitate access for ransomware groups, data leakers, and advanced persistent threat groups (APTs) into corporate networks. They are highly specialised, and professional, and operate in an established, lucrative market often characterised by rigid rules and conventions. Every ransomware attack or data breach begins with initial access, following the reconnaissance phase of an attack.

K8s Backup Automation: Tools & Best Practices

Kubernetes (K8s) is a key platform for deploying and managing containerized applications. As more and more businesses use Kubernetes, it’s clear that there’s a need for robust data protection strategies. A crucial element of these strategies is the automation of procedures to backup K8s to prevent data loss, which could otherwise result in significant operational disruptions and financial consequences.

Add GitGuardian Secrets Detection To Jira Cloud

If you are using Jira Cloud for issue-tracking and project management, we have some great news! GitGuardian can now help you find and remediate any plaintext secrets found inside your Jira Cloud instance, You can now rely on GitGuardian's real-time secrets detection to find credentials - shared in Jira ticket descriptions, comments, or even titles. Integrating Jira Cloud with GitGuardian is simple, but does requires a Business or Enterprise plan.

The Rise of Cyber Mercenaries: Governments' Secret Weapons in Cyber Warfare | Razorthorn Security

In this episode, we tackle some of the most pressing issues in the convergence of cyber warfare, information security and political strategy. Our guests, Iain and Chris, share their frontline insights on how the digital realm has become a playground for clandestine operations, where cyber mercenaries are the new knights, rooks and perhaps even the kings.

Netskope One & The Zero Trust Engine

The Netskope Zero Trust Engine is at the center of the Netskope One platform, which ensures continuous adaptive trust-based policy controls extend effortlessly and consistently across Secure Web Gateway (SWG), Cloud Access Security Broker (CASB), Zero Trust Network Access (ZTNA), Cloud Firewall (FWaaS), and Software Defined WAN (SD-WAN) services, leaving no security gaps and delivering an exceptional user experience.

The Role of Self-Attestation in Compliance: Benefits and Challenges

Self-attestations are an increasingly popular tool for cybersecurity compliance frameworks such as the National Institute of Standards and Technology (NIST) Cybersecurity Framework and the Cybersecurity and Infrastructure Security Agency (CISA) directives. The idea is that organizations attest to meeting specific security controls and requirements without third-party validation.