Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Blogs

I, CyBOK - An Introduction to the Cyber Security Body of Knowledge Project

The Cyber Security Body of Knowledge project or CyBOK is a collaborative initiative mobilised in 2017 with an aspiration to “codify the foundational and generally recognized knowledge on Cyber Security.” Version 1.0 of the published output of this consultative exercise was quietly released last year and then more publicly launched in January 2020. Yet, this free and information-packed publication does not appear to have captured the attention it perhaps deserves across the wider industry.

Biggest Challenges in Enterprise IT: Data Quality Gap & Data Dispersion

Enterprise data comprising business, operations and assets information, resides in different forms and in different places. While the data is distributed they carry important relationship insights which when leveraged can accelerate and improve decision making to drive the outcomes. This is one of the key challenges that analytics solutions, like AIOps, need to address.

INETCO Insider: Combat the impact of COVID-19 on your payments business

As we head into Q3 of 2020, life is looking quite different for all of us around the world. With many governments beginning to implement plans to ease restrictions, economies are expected to slowly regain their footing. Even as brick and mortar businesses around the world gradually re-open, we will continue to see a trend towards contactless payments, digital banking, online orders and e-commerce.

What is AES Encryption and How it Works?

If your organization offers or needs cyber security solutions, you must have heard of the Advanced Encryption Standard before. In this article, we will take a closer look at AES and how it can be beneficial for your organization. The Advanced Encryption Standard (also known as Rijndael) is one of the most popular global encryption standards, that is why its acronym AES keeps coming up in almost every discussion related to cyber security.

Approaching Kubernetes Security - Detecting Kubernetes Scan with Splunk

The Kubernetes framework has become the leading orchestration platform. Originally developed by Google, Kubernetes is a "platform for automating deployment, scaling, and operations of application containers across clusters of hosts" * . The kubernetes platform is used in all Cloud platform provider vendors as a tool that allows orchestration, automation and provision of applications and specific needs computing clusters and services.

COVID-19 Scam Roundup - May 11, 2020

Digital attacks continue to exploit coronavirus 2019 (COVID-19) as part of their malicious operations. On May 5, 2020, the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) along with the United Kingdom’s National Cyber Security Centre (NCSC) published a joint alert in which they revealed that they had witnessed APT actors targeting local governments, academia and pharmaceutical companies.

Best Practices for Scoring Your Environment's Security Measures

For most practical uses today, a combination of hardening and vulnerability detection is required to secure even the most basic digital environment. In each area it is important to see the progress you’re making in these competencies so that you can improve and build on the work you and your team have done over time. But with so many assets in your digital environment, how do you score the effectiveness of these security measures?