Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Gather Your Team and Conquer Dystopian Vendor Security Reviews

Let’s talk about vendor security reviews. If you felt some form of unpleasant emotion just reading the phrase “vendor security review,” I understand. You and I are not so different. You have likely participated in completing at least one vendor security review in your career. During the process you may have questioned humanity, your career choice or at least whether or not your company should be doing business with the procuring organization.

5 Common Cybersecurity Mistakes You Can Easily Prevent

A comprehensive organizational strategy and robust company security policy are crucial for effective cybersecurity. A company needs to make a concerted effort to design, execute, and follow through with a plan to deal with cyber-risk management from top to bottom. There is no one-size-fits-all strategy for the needs of enterprises in managing cyber risk. But in order to maintain strong system security in the face of constant threats, there are some core principles that every company should follow.

Logicalis Acquires Q Associates to extend specialist Microsoft and data-centric IT services capabilities across their UK&I operation

Logicalis today announced it has acquired Q Associates, one of the UK's leading providers of IT consultancy and advisory services around data management, data protection, compliance and information security.

Fortune and Great Place to Work® Name Forward Networks One of the 2022 Best Small Workplaces, Ranking #20 Nationally

Great Place to Work® and Fortune magazine have honored Forward Networks as one of the 2022 Best Small Workplaces. This is Forward Networks' first time being named to this prestigious list, this year coming in at 20th place nationally. Earning a spot means that Forward Networks is one of the best companies to work for in the country.

No Service Is Safe - Atlassian Demands Increasing

This year, Cyberint Research Team has witnessed a major spike in compromised Atlassian service credentials compared to 2021. When observing compromised Atlassian credentials from the start of 2021 and 2022 through to August of the relevant year, we have seen an increase of around 337% (Figure 1, 2) in leaked credentials.

5 Misconceptions About Penetration Testing for Mobile Apps

People these days use mobile apps for everything from ordering groceries and medicines to paying loan EMIs and sending or receiving money. While it sounds convenient, users' private info, such as email, home address, bank details, etc., is always at risk of being stolen. Therefore, it becomes the duty of app development companies to take up stringent measures to ensure complete security for their users. And that's when penetration testing comes into the picture.

How to Reduce Your Cybersecurity Insurance Premium in 2022

Cyberattacks are growing in prevalence and sophistication, and so are the damage costs associated with these events. According to a 2022 cost of data breach report, the average damage cost of a data breach has reached a record high of USD 4.35 million. Provoked by increased data breach damage costs, a growing number of US businesses are partnering with Cybersecurity Insurers, who, in turn, respond to this increased demand by inflating cyber insurance premiums.