Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Featured Post

A Lack of Resources and Talent Leaves UK SMEs Dangerously Exposed

In the last few years, we have witnessed some of the most seismic changes to the IT security landscape; from global pandemics and geo-political issues to a global energy crisis, to growing cybersecurity threats, to multiple country elections and subdued economic conditions. But, regardless of stretched IT and cybersecurity budgets, and a significant IT skills shortage, threat actors continue to innovate as cyber threats evolve at breakneck speed; organisations have no choice but to defend themselves.

Step-by-Step Guide to Implementing a News Aggregator API

For any news-based website or application, having access to timely and relevant information is crucial. One way to achieve this is by integrating a News Aggregator API into your platform. In this post, we will provide you with a comprehensive, step-by-step guide on how to implement a News Aggregator API effectively.

Data classification: The fundamental requirement of successful DLP programs

The way we store data has undergone a dramatic shift. From good ol’ floppy disks to today’s cloud storage solutions, advancements in storage have slashed costs and allowed organizations to hold exponentially more data. And we are all taking advantage of this. In fact, data is proliferating at a staggering 25% annually. This presents a double-edged sword. On the one hand, this vast data lake holds immense potential for valuable insights.

Why Am I Getting So Many Spam Calls?

You may be receiving an increase in spam calls if your phone number is on the dark web or people search sites, if you’ve answered spam calls in the past or if your phone number was leaked in a data breach. Spam calls are unwanted calls that could be from telemarketers, robocallers or scammers. Although some spam calls are simply unsolicited, scam calls fall under the category of spam calls but are different due to their malicious nature.

What is SIEM in cyber security? Definition & Meaning.

Security Information and Event Management (SIEM) is a critical tool in modern cybersecurity, combining Security Information Management (SIM) and Security Event Management (SEM) to provide real-time monitoring, threat detection and incident response. Obrela’s SIEM solutions collect and analyse security data from various sources to provide a comprehensive view of the security landscape.

Using Honey Tokens for Threat Detection with Netwrix Threat Manager

Today, cyberattacks are no longer a matter of if, but when. Spotting malicious actors before they can do damage requires a proactive approach. One effective strategy is to use honey tokens. This article explains what honey tokens are and how Netwrix Threat Manager enables organizations to easily create and use them to gain the threat intelligence they need to shut down attacks and improve their security posture.

Identifying Common Open Port Vulnerabilities in Your Network

When intruders want to break into an establishment, they look for an opening. An open port is one of the openings that a hacker or threat actor looks for to access a digital network. That open port may be on a firewall, a server, or any network-connected computing device. Just as a single unlocked door can jeopardize your privacy and grant access to a physical building, a single open port can provide a point for hackers to breach your systems, exposing you to their malicious intents.