Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Predictions 2022: Five Threats That Will Impact Your Personal Data and Privacy

In Q1 of 2021, 4 in 10 people encountered an unsafe link while using their mobile devices – less than a year later, 5 in 10 people encountered threats in Q3 2021. This trend will only continue as text message, email and social media phishing scams surge.

Australia Leads with Controversial Cyber Laws

The Australian government is looking to pass the Security Legislation Amendment (Critical Infrastructure) Bill 2020, an overhaul which is aimed to help Australian businesses fend off cyberattacks. The Bill expands the business sectors that were previously defined as critical infrastructure by adding, amongst others, Food and Grocery, Finance and Banking, Universities, Communications, Defense, Energy, and Transportation to the list.

SECUDE Celebrates 25 Years of Innovation and Delivery of Excellence to its Customers

LUCERNE, DECEMBER 2021: SECUDE, a leading Digital Rights Management (DRM) solutions provider, and Microsoft Partner, is celebrating the 25th year of innovation and delivery of excellence to its customers. SECUDE is looking back proudly at the many milestones in its history of shaping the data security industry.

Locate and Protect GDPR-Related Sensitive Data in SharePoint

The General Data Protection Regulation (GDPR) established rules for handling personal information in the EU. And with strict penalties for noncompliance, it puts the onus on businesses like yours to know where all their GDPR-related data is located and how it’s treated.

Desired State Configuration without Managing PowerShell Code

Back in 2008, Microsoft added a new technology to PowerShell and named it Desired State Configuration or DSC. In essence, DSC is the framework that delivers and gives the user tools to maintain configuration. Desired State Configuration allows you to define your environment’s aspired state with a simple declarative syntax that has been added into the PowerShell script. It is then assigned to each target server in your environment.

Data Masking Techniques and Best Practices for Data Security

The risks of a data leak have never been higher. Over the last year, data breach costs rose from $3.86 million to $4.24 million, a record high. Data exfiltration, sophisticated hacker attacks, and even insider threats are forcing organizations across the board to take a more sophisticated, multi-layered approach to data security. Enter: data masking. Data masking is a simple technique that can help organizations continue to work productively while keeping sensitive data stored safely.

Elastic Security was recognized as a Customers' Choice in 2021 Gartner Peer Insights 'Voice of Customer': SIEM Report

Elastic has been recognized as a Customers’ Choice in the 2021 Gartner Peer Insights ‘Voice of the Customer’: Security Incident and Event Management (SIEM) report with an overall rating of 4.6 out of 5 based on 51 reviews as on November 25, 2021. The report combines the feedback and experiences of more than 51 Elastic Security customers on Gartner Peer Insights™. Elastic’s Willingness to Recommend score was 98% — the highest of all vendors included in the report.

Pivoting to data security

End of summer 2020: Bearer takes the decision to pivot. We have been building an API monitoring & debugging solution for engineering and DevOps teams. We have a stable product and dozens of users onboard. Even so, after months of iterations product adoption is still low and our positioning with all-in-one monitoring solutions is disadvantageous. Product-Market-Fit (PMF) is definitely not in the line of sight.

Social Engineering Part 3: Social engineering prevention techniques

Social engineering is a form of security fraud that relies on psychological manipulation techniques to trick people into revealing sensitive information. In the previous two articles in this series, we discussed in depth what social engineering is, and highlighted a variety of both common and sophisticated social engineering attacks.