Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

March 2024

Unraveling Global Financial Scandals: Insights into State-Sponsored Operations

Dive into the murky world of global financial scandals and state-sponsored operations with us. From the Wirecard scandal to the 1MDB debacle, and the infamous case of Edward Snowden, we uncover the intricate web of espionage and corruption that spans nations. Join the discussion as we explore the role of nation-states in these high-profile cases, where operatives are allegedly turned by foreign intelligence agencies to carry out nefarious deeds. From missing COOs to operatives fleeing to foreign countries, the plot thickens as we delve deeper into the shadows of international intrigue.

Election Security: Defending Democracy in Today's Dynamic Cyber Threat Landscape

With over 50 countries heading to the polls this year, including major economies like the U.S., India and the U.K., 2024, one way or another, will be a defining year with over 4 billion voters – around half the world’s population – participating in the democratic process.

Weekly Cyber Security News 28/03/2024

Let’s catch up on the more interesting vulnerability disclosures and cyber security news gathered from articles across the web this week. This is what we have been reading about on our coffee break! Social engineering attacks can be very effective and good that someone spotted one but unfortunately for them persistence scored in the end.

Why Visma chose Aikido Security for its 170+ companies

Visma selects Aikido security, entrusting them to deliver software security to their portfolio of 170+ companies. Securing software is vitally important to Visma, whose operations deliver software to dynamic SMEs, powerhouse corporations, and key public institutions worldwide. Together, Visma and Aikido are not just participating in the future of application security; they are creating it.

Introducing ISO 42001: Ensuring responsible AI usage and development

Artificial intelligence (AI) has become integral to many industries, driving new innovation and opportunities for growth. At the same time, the rapid adoption of AI has created new risks for companies, ranging from ethical governance in accountability and fairness to reputation and trust — coupled with the increased cyber risk for organizations developing, deploying, and using AI systems.

Implementing Hyperautomation: A Blueprint for Security Managers and SecOps Teams

One of the key questions we get is “how do I get started with hyperautomation?” It can seem slightly overwhelming if you haven’t automated in the past, or you’re used to attempting to automate using legacy SOAR solutions. If you’re wondering where to get started with hyperautomation, look no further. We caught up with Security Automation Leader Filip Stojkovski, who put together a handy blueprint on how and where to start your journey to hyperautomation.

Choosing the Best Mobile Application Security Testing Tool in 2024

As per Statista, mobile apps are estimated to generate over $935 billion in revenue in 2024, which includes: This means businesses must prioritize mobile app testing and security posture to safeguard users' personal and financial information from security breaches. For successful mobile app testing, your team must test the app through numerous operating system versions, network bandwidths, screen resolutions, and devices—to ensure the app performs seamlessly across devices.

SIEM in Seconds - Streamline Investigations with Splunk Enterprise Security

A SOC analyst's day-to-day tasks involve investigating notable events to gather information about security incidents. Recent enhancements within the Incident Review and Risk Analysis dashboards in Splunk Enterprise Security allows analysts to streamline their investigation process and reduce the number of manual tasks they perform daily. Multiple drill-down searches on correlation rules, updates to "dispositions" in the Incident Review dashboard, and hyperlinks in Correlation Search “Next Steps” allow for faster, more efficient investigations.

SIEM in Seconds - Splunk Enterprise Security Enhanced Risk Analysis Dashboard

With the enhanced risk analysis dashboard in Splunk Enterprise Security, security analysts can now monitor user entity risk events from detections across risk-based alerting and behavioral analytics, which provides a deeper, and more holistic, layer of visibility across all detection events.

SIEM in Seconds - Splunk Enterprise Security Auto Refresh and Timeline of Notable Events

SOC analysts are overwhelmed sifting through a sea of notable events. They are unable to prioritize events and act fast. With Auto Refresh in the Incident Review interface, users will not have to re-run the Incident Response search or refresh the page. Furthermore, an interactive timeline for notable events within the Incident Response interface enables the SOC to quickly prioritize critical incidents.