Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Enterprise Software Security: Challenges and Best Practices

In an age where digital information is critical, enterprise software security is more important than ever. As organizations increasingly rely on complex software systems to manage their operations, the risks and vulnerabilities associated with these systems are growing. This article examines the key challenges in enterprise software security and outlines best practices for mitigating these risks.

How Cybercriminals Use the Dark Web to Undermine Security

Major search engines merely scratch the surface, exploring 4% of the vast web. Concealed within the deep web, the dark web emerges as a hub for cybercriminal activities. This covert digital underworld operates anonymously outside conventional browsers, providing an ideal haven for cybercriminal coordination beyond law enforcement's grasp.

The human element - cybersecurity's greatest challenge

The stark reality of cybersecurity today isn't merely a question of advanced software or strategic counterattacks. It's about people. The financial impact is undeniable with cybercrime costs projected to reach an astonishing $10.5 trillion annually by 2025. Yet, beneath these figures lies a more pressing issue: the exploitation of human psychology. According to Verizon's 2023 Data Breach Investigations Report (DBIR), 74% of all breaches involve the human element, including social engineering attacks, errors, or misuse, while half of all social engineering attacks feature pretexting incidents - which is almost double from the year before.

PCI Compliance Levels: A Developer's Guide to PCI Compliance

Compliance is something that developers dislike. Traditionally led by risk and information security teams, compliance standard enforcement in organizations is not something software engineers are trained to do. So when the words “PCI compliance” are tossed around, for many developers it mentally translates to limitations, guardrails, bottlenecks, and drastic changes to their workflows that impact productivity. But that doesn’t have to be the case.

Rise of cloud agnosticism: challenges and myths

In the evolving landscape of technology, cloud agnosticism has seen increasing traction. This refers to the ability to design and deploy applications seamlessly on any cloud platform, whether that be AWS, GCP, Azure, or others. Cloud agnosticism is essentially a design principle that advocates for flexibility, portability, and interoperability, allowing organizations to use multiple cloud providers without being tied to the services or infrastructure of any single one.

$9 million seized from "pig butchering" scammers who preyed on lonely hearts

US authorities have seized almost $9 million worth of cryptocurrency linked to a gang engaged in cryptocurrency investment fraud and romance scams. The US Department of Justice has announced that the seized funds are connected to cryptocurrency wallet addresses alleged to be associated with a "pig butchering" gang that has claimed over 70 victims around the world. "Pig butchering" is one of the world's fastest-growing types of scams.

Five things we love from the Total Economic Impact of Egress study

As part of our efforts to effectively quantify and demonstrate the return on investment (ROI) for our customers, Egress has commissioned Forrester Consulting to conduct a Total Economic Impact of Egress Intelligent Email Security study. As part of this study, Forrester interviewed and gathered data from four Egress customers. This data and the interviewees’ experiences were aggregated to create a composite customer organization – a financial services firm with 9,000 mailboxes.

Weekly Cyber Security News 23/11/2023

A selection of this week’s more interesting vulnerability disclosures and cyber security news. For a daily selection see our twitter feed at #ionCube24. Breaches are never timed well, and this one certainly isn’t before the return of the ever popular Black Friday sales storm. Be prepared for some scam emails from them as well as all the others. As always, check before you click! Talking of checking before you click…

Cato Application Catalog - How we supercharged application categorization with AI/ML

New applications emerge at an almost impossible to keep-up-with pace, creating a constant challenge and blind spot for IT and security teams in the form of Shadow IT. Organizations must keep up by using tools that are automatically updated with latest developments and changes in the applications landscape to maintain proper security. An integral part of any SASE product is its ability to accurately categorize and map user traffic to the actual application being used.