Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

What Are the 5 Components of the COSO Framework?

In 1985, The Committee of Sponsoring Organizations of the Treadway Commission (COSO) originally formed to enable the National Commission on Fraudulent Financial Reporting. COSO’s original goal, to review causal factors leading to fraudulent financial reporting, ultimately evolved as more technologies became embedded in the process.

Malware: Three Industry Problems and How to Solve Them

In the last few years, organizations have been subject to extortion through ransomware. Now, hackers are bypassing the nasty business of trying to get people to give them cryptocurrency to simply hijacking your processor to mine for cryptocurrency. As a result, the methods employed are growing in sophistication and creativity, including using internet memes to compromise systems.

CSOs: 69% of Data Breaches are Attributed to Employee Negligence, Theft, or Sabotage

Recent findings report that on average, 96 percent of systems across all industry segments have been breached. While you should absolutely update your information security system and protocols to provide the best protection you can for your data, you should also know how to spot a data breach. Unfortunately the odds of escaping one aren’t in your favor, but you can increase your chances of spotting a breach quickly and containing any damage.

Regulatory Fines, Prison Time Render "Check Box" Security Indefensible

In May 2017, the Equifax data breach compromised critical credit and identity data for 56 percent of American adults, 15 million UK citizens and 20,000 Canadians. The Ponemon Institute estimates that the total cost to Equifax could approach $600M in direct expenses and fines. That doesn’t include the cost of the security upgrades required to bring its IT system up to date.

The Changing Face Of Cybersecurity In The 21st Century

67% of small and micro businesses have experienced a cyber attack, while 58% have experienced a data breach within the last 12 months, according to a study conducted by the Ponemon Institute. Cybersecurity has become one of the major questions that plague the 21st century, with numerous businesses reporting significant losses resulting from loss of private customer data, denial of service (DoS) attacks.

Detectify security updates for 23 January

For continuous coverage, we push out major Detectify security updates every two weeks, keeping our tool up-to-date with new findings, features and improvements sourced from our security researchers and Crowdsource ethical hacker community. Due to confidentially agreements, we cannot publicize all security update releases here but they are immediately added to our scanner and available to all users. This post highlights a few things that we have improved in the last two weeks.

Web Hosting Security Best Practices

If you’ve been online recently, you may have read the news about hackers demanding a ransom from Dublin’s tram system. Visitors to the Luas website were greeted by the hackers’ message threatening to publish the stolen information unless they were paid one Bitcoin (approximately 3,300 Euros or US $3,800). While the message itself appeared to be harmless, the fact is that the hackers could just as easily have used the domain to spread malware or phishing attempts.

Ignyte - GRC Company for Cybersecurity Receives Funding

January 15, 2019 Miamisburg, OH – Ignyte Assurance PlatformTM, an industry leader in managing governance, risk and compliance (GRC), has received $100,000 from the state of Ohio to develop and integrate cybersecurity technology from the Air Force Research Laboratory. The company will use the funding to develop and integrate cybersecurity technology from the Air Force Research Laboratory to improve data collection and analysis.