Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

eKYC Verification & Digital Onboarding : Where Indian Crypto Exchange Platforms are headed

Crypto Trading volume and user signups in India have increased by up to 45% in recent weeks as a result of the steady bitcoin price and the rupee’s weakening. Bitcoin prices have been stabilising inside an increasingly narrow range this week, even as global equities and bond markets remained volatile, with signs of stress emerging in sovereign debt and currency markets. Bitcoin (BTC) has risen almost 2% in the last 30 days.

Place your budgets on the right cybersecurity for your business

As budgets start to tighten for countless businesses concerned about the potential financial winter that many are predicting, security teams across the world are reviewing where best to place their investment to ensure they get the best “bang for their buck”. With that in mind, now might be time to explore some key areas where I see organisations spending wisely to deliver great results on a budget.

Shifting Left with SAST, DAST, and SCA: Advanced Best Practices

In the past, teams incorporated security testing far after the development stage of the Software Development Lifecycle (SDLC). Security testing would influence whether the application would to proceed to production, or get passed back to the developers for remediation. This process caused delays while teams worked on remediation or, worse yet, it increased security risks when teams released software without applying the necessary security measures.

Exploring the differences between symmetric and asymmetric Encryption

Data encryption goes back to ancient civilisations that used forms of message concealment, in peace as well as in wartime. The Egyptians used Disordered Hieroglyphics, the Greeks Steganography, the Spartans Scytale and the Romans, the Caesar Shift Cypher. While these basic methods laid the foundations for modern cryptography, what has evolved are two fundamental approaches based on complex mathematics: symmetric and asymmetric encryption.

Disk vs file encryption - which is better at Data breach prevention?

Data encryption is a bit like insurance - we all know we need it (a necessary evil you might say), but it’s difficult to decide what we need to protect, and with an increasing amount of options out there, it’s a mission in itself to find the right provider. That’s probably why when we take out insurance we tend to only get coverage when we feel it’s absolutely necessary – for example, for our property, our cars and when we travel.

Kroll named as winner at Computing Security Awards 2022

We were recognised in all four of the categories we were shortlisted in: With penetration testing playing a key role in enabling organisations to understand and significantly reduce their cyber security risk, we are delighted that our CREST-accredited services have again been recognised by customers as a leading solution in the industry.

CrowdStrike and Google Chrome: Building an Integrated Ecosystem to Secure Your Enterprise Using the Power of Log Management

Organizations today face an onslaught of attacks across devices, identity and cloud workloads. The more security telemetry an organization has to work with, the better threat hunters can contextualize events to find and remediate potential threats. Google recently announced Chrome Enterprise Connectors Framework, a collection of plug-and-play integrations with industry-leading security solution providers.

How to validate Kubernetes YAML files?

Kubernetes has taken center stage in how we now manage our containerized applications. As a result, many conventions to define our Kubernetes apps exist, including structures such as YAML, JSON, INI, and more. This leaves us to consider what is the best strategy to follow for our applications. Additionally, we must then also ask how we can validate our application configurations depending on the path we’ve chosen in terms of file structure and especially security.

Citrix's Corey Hill: How to make mental health a priority for your security team

In our latest episode of the Future of Security Operations podcast, Thomas speaks to Corey Hill, Director of Security Operations and Incident Response at Citrix. After working at organizations such as Mandiant and Cisco, Corey joined Citrix in 2020 when there were just a handful of people on the SOC team.