Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Cybersecurity Readiness (Definition and 4 Evaluation Steps)

Cybersecurity readiness is the ability to identify, prevent, and respond to cyber threats. Yet despite the daily headlines and warnings, organizations struggle to achieve cybersecurity readiness. Just look at the statistics: 78% of senior IT and security leaders lack confidence in their company’s security posture. And, despite increased investments in cybersecurity controls, nearly 80% believe their organization lacks sufficient cybersecurity protections.

The Different Types of Ransomware

The different types of ransomware include crypto ransomware, locker ransomware, scareware, leakware and Ransomware-as-a-Service (RaaS). Ransomware is a type of malware, also known as malicious software, that prevents victims from accessing the data stored on their devices until they’ve paid a cybercriminal a certain amount of money, commonly referred to as a ransom.

Exploring the Monetary Authority of Singapore's TPRM Guidelines

The Monetary Authority of Singapore (MAS) is Singapore's central bank and financial regulatory authority. Along with regulating monetary policies, banking, and currency issuance, MAS sets standards for financial institutions' operational practices. MAS’ third-party risk management guidelines provide structure for financial institutions to ensure resilience against third-party outsourcing arrangements risks, including supply chain vulnerabilities and information security.

One Identity Manager version 9.2 has been released GA

Identity Manager governs and secures your organization’s data and users, meets uptime requirements, reduces risk and satisfies compliance by giving users access to data and applications they need – and only what they need – whether on-premises, hybrid or in the cloud. Now, identity security can be driven by business needs, not by IT capabilities. With Identity Manager, you can unify security policies and satisfy governance needs — today and long into the future.

The Difference Between Securing Custom-Developed vs. Commercial Off-the-Shelf Software

Modern applications are designed to process, use and store vast amounts of sensitive data. As adversaries seek to infiltrate these applications, IT and security teams must ensure the software they use has the strongest possible security. The first step to implementing strong application security is understanding the type of application you need to protect. The two types of applications security teams must be familiar with are custom-developed software and commercial off-the-shelf (COTS) software.

Bluejacking vs Bluesnarfing: Exploring Bluetooth Hacking Variations.

Imagine walking down the street, innocently scrolling through your phone, completely unaware that someone nearby is attempting to hijack your Bluetooth connection. It sounds like a scene straight out of a spy movie, right? Well, this kind of covert hacking, known as bluejacking and bluesnarfing, is a growing concern in today’s digital age.

Top tips: Zero-day vulnerabilities in mobile apps-top 5 risks and mitigation strategies

Top tips is a weekly column where we highlight what’s trending in the tech world and list ways to explore these trends. This week we’re identifying the risks and vulnerabilities associated with mobile apps and discuss strategies to mitigate them. In our digitally connected world, mobile apps have become an integral part of our daily lives. We depend on them for communication, productivity, entertainment, and much more.

Tanium is a Proud Participant in the Microsoft Security Copilot Partner Private Preview

Tanium announces its participation in the Microsoft Security Copilot Partner Private Preview. Tanium was selected based on its proven experience with Microsoft Security technologies, willingness to explore and provide feedback on cutting edge functionality, and close relationship with Microsoft.

TON Wallet: A Guide to Telegram's Crypto

The TON wallet has had quite a challenging journey, especially in dealing with regulators right from the start. Until recently, the Telegram wallet app project remained in the realm of a test version, having somewhat discredited itself in the eyes of investors a few years ago due to legal disputes with the SEC, which led to its folding. Today, those times are behind, and TON is fully operational. Its convenience is top-notch as it is seamlessly integrated into the popular messenger Telegram, allowing users to make payments and reap the benefits.

What is purple teaming and how can it strengthen your cyber security?

To defend against rapidly evolving cyber threats, businesses need to continually adapt and innovate. This means that red and blue teams must work together on an ongoing basis to maximise their individual and collective impact. Purple teaming allows them to achieve this more effectively, significantly advancing organisations’ security posture.