Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

CISO Interview Series: The thinking of a CISO at the front end of the cyber threat landscape.

What are the most important areas for a CISO to focus on? When speaking to Aman Sood, it becomes clear that the job of a CISO encompasses every aspect of a business. Aman is the Head of Cyber Security with Jimdo, a website building platform that helps small businesses start, grow, and ultimately thrive online. Aman is also the Cyber Security Group Chairman for ISITC Europe CIC, a non-profit industry body and a catalyst for collaborative innovation within the capital markets.

Protecting Intellectual Property in the Automotive Industry

The automotive industry is experiencing challenge and change from all sides. Automotive OEMs are working to better understand the changing customer journey in relation to their products, and identifying profitable growth opportunities through the integration of digital technology into all areas of the business.

Code Signing Certificate: Security for Executables

Day in and day out, we install various executable files from the web which are relevant to our work. But while installing, sometimes a message is popped up, “This file can harm your computer”. That means, along with those executable files, we also receive some malicious software that can harm our computer system. So, a software development company must protect its software, which can get infected by some unwanted harmful software at the time of distribution across the web.

Beware! Qakbot Banking Trojan Picked Up New Tricks

Attackers have begun using new malware to gain an initial foothold onto compromised networks and systems in recent campaigns. What started as a Trojan malware called Qbot in 2007 has now evolved into Qakbot with new tricks. Qakbot has been active since it was first discovered and continues to threaten financial institutions and individual bank customers. This multi-purpose Trojan malware is designed to steal banking credentials such as login information and passwords.

Cyber Security For Email Communication: Why You Need It and Its Best Practices

Email is a universal means of electronic communication used by millions of people. The organization uses them to communicate with the co-employees, suppliers, partners, and customers. It also acts as a suitable medium for cybercrimes to initiate an attack that causes severe damage to the organization. It is estimated that 90% of cyber-attacks emerge from emails. Effective cyber security practices will help the organization prevent attacks and protect the organization.

What Is the ISA/IEC 62443 Framework?

Cybersecurity threats to manufacturing and process plants are coming from a wide range of attack vectors, including supply chain, logistics, enterprise computing, remote connections, operator stations, programmable logic controllers, distributed control systems (DCSs), smart sensors, and new smart devices. Internet of Things (IoT) technologies offer greater connectivity and endless applications, but they make the cybersecurity landscape more complex.

Identity Verification for Telehealth: A New Boon To The Medical Industry

Telehealthcare Sector is one of the best innovations that could have happened to the healthcare industry. The way it fulfilled the need of the ailing person and health care providers during the pandemic in 2019 is ineffable. For the first time, everywhere in the world, people realized the power of Teleconsultation for doctors and medicines. And it continues to grow and expand to meet the requirement of the users and suppliers.

Cyber Security News: The NHS 111 Attack

In a recent article looking at cyber security trends, we highlighted the potential for incidents to occur from supply chain attacks, as well as the prevalence of ransomware across the Internet. No organisation is safe from attack, as illustrated by the NHS 111 attack at the beginning of the month.

How attack surface management helps during an M&A process

There is always the risk that sensitive data will be exposed during mergers and acquisitions. Throughout the M&A process, you’re adding new ways for hackers to enter your systems, enabling them to access sensitive customer information. This is because the merging of companies usually results in an increase in the attack surface, therefore, increasing the number of unknown security risks the acquiring company is unaware of. The numbers don’t lie.