Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Introducing Security Ratings for Telecommunications, Internet Service Providers, and Cloud Providers

Telecommunications, Internet Service Providers, and Cloud Providers are some of the most critical sectors on the planet. They enable global connectivity, provide access to a wealth of information in real time, and transform business operations. As the foundation of modern communication, these industries have ushered in countless innovations and propelled society forward.

Red Flags for Phishing: Verizon Outlines Common Scams to Watch Out For

Verizon has published an article outlining various forms of social engineering attacks, including SMS/text messaging phishing (smishing), voice phishing (vishing), and spear phishing (targeted attacks, often via email). Verizon warns users to be on the lookout for the following red flags: Verizon concludes, “Remember, phishing is common and perpetrators are hoping to catch you with your guard down. But most companies will never proactively reach out to you.

Cybercriminals Celebrate the Holidays with Dark Web Data Dumps, Dubbed "Leaksmas"

Millions of data records and GBs of data from organizations around the globe were made freely available to cybercriminals to coincide with dates around Christmas of 2023. The pressure presented by cybercriminals threatening to publish data on the web is very compelling. After all, what company wants to be responsible for millions of everyday people potentially becoming victims of scams and cyber attacks? That’s right, not a single one.

Another Mortgage Lender Embattled; LoanDepot Faces Disruptions

LoanDepot is one of the nation’s most widespread nonbank mortgage lenders, offering financial solutions and opportunities to homeowners. Based in Irvine, California, LoanDepot allows homeowners to purchase land, refinance it, and strike the best deal in equity costs. After coming into existence in 2010, their history became one of upward growth; two years later, they were licensed in all 50 states and began expansions.

Keeper Security Introduces Granular Sharing Enforcements

Keeper Security is excited to introduce Granular Sharing Enforcements for all products in the Keeper® platform. This feature, an extension of Keeper’s robust existing sharing policies, enables administrators to apply detailed restrictions for record creation and sharing to user roles. By doing so, Keeper Admins can easily enforce the principle of least privilege and simplify compliance.

Introducing Cloudflare's 2024 API security and management report

You may know Cloudflare as the company powering nearly 20% of the web. But powering and protecting websites and static content is only a fraction of what we do. In fact, well over half of the dynamic traffic on our network consists not of web pages, but of Application Programming Interface (API) traffic — the plumbing that makes technology work.

Harnessing the Power of the Cloud: Understanding the Vital Role of Privileged Access Management

The cloud stands as a revolutionary force, redefining the way businesses operate, collaborate and innovate. Its scalability, flexibility and accessibility have transformed industries, offering a wealth of opportunities for organizations of all sizes. However, with these advancements come significant security concerns, particularly in managing access to sensitive data and critical systems.

The Essentials of Cyber Security Risk Management

As businesses have evolved, so have cybercriminals and the means they use to try and penetrate their digital assets. Every day, new threats arise and unscrupulous organisations create means to attack physical networks, cloud services, and other key business functions and this is why having a robust cyber security risk management plan is critical.

Top Network Firewall Security for Cyber Threats

Cyber threats are getting smarter and are going after businesses of all kinds. Your first line of defense against these threats should be network firewall security, which protects your private data and systems. By filtering data based on set security rules, firewalls create a wall between trusted internal networks and untrusted external ones. A study from Cybersecurity Ventures says that by 2025, cybercrime will cost the world $10.5 trillion every year.

What Does a SIEM Solution Do: Logsign Perspective

Businesses are currently witnessing improvements in cybersecurity capabilities, thanks to advancements in Artificial Intelligence (AI). However, the progress is accompanied by a parallel increase in the threat and sophistication of cyber-attacks, especially when the right event monitoring and threat detection tools are not utilized. Deloitte's latest research on security operations indicates that in 2023, 12.5% of businesses experienced more than one security event.