Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

What are the benefits of an incident response retainer?

A cyber incident response retainer can help businesses to better manage both the financial and security risks posed by constantly evolving threats. This article outlines the benefits of the retainer model and also covers what organisations should look for in a potential provider.

UpGuard Expands Vendor Risk Questionnaire Library with New DORA Questionnaire

UpGuard is excited to announce the latest addition to our Vendor Risk Questionnaire Library: the DORA (Digital Operational Resilience Act) questionnaire! The addition of DORA to the Questionnaire Library reflects UpGuard’s ongoing commitment to providing our customers with the necessary tools to navigate today’s evolving regulatory standards.

What is Business Continuity and Disaster Recovery (BCDR)?

Running a business is no easy feat, and it's made that much harder by the threat of natural disasters, data breaches, or cyberattacks that can happen at any given moment. Such cases can lead to delayed business operations, financial or legal problems, or even business shutting down. So, how can businesses prepare for the worst? The answer lies in implementing a Business Continuity and Disaster Recovery (BCDR) plan.

Critical RCE Vulnerabilities Impacting HPE Aruba Networking Access Points

On September 24, 2024, Hewlett Packard Enterprise (HPE), the parent company of Aruba Networks, released a security bulletin addressing three critical command injection vulnerabilities affecting Aruba Networking Access Points. These vulnerabilities, identified as CVE-2024-42505, CVE-2024-42506, and CVE-2024-42507, could allow remote unauthenticated attackers to execute code with privileged access.

Amplify SOC efficiency via automated cloud detection and response with Sysdig and Torq

Cloud attackers are swift and sophisticated, requiring robust threat detection and response programs that can keep pace with these malicious actors born in the cloud. They exploit the automation and scale of the cloud, along with new techniques, to accelerate all stages of an attack and inflict damage within minutes.

Sequoia spotlight: Deploying the newest macOS with Endpoint Central

Apple released its new macOS Sequoia 15.0 on Sept. 16, and we at ManageEngine are excited to announce our support from the day of its release. Before we get into the details, let’s look at which devices are eligible for the facelift. Source: Apple Sequoia was unveiled at WWDC 2024 with a range of features around privacy, security, and its much-awaited Apple Intelligence.

New standards for a faster and more private Internet

As the Internet grows, so do the demands for speed and security. At Cloudflare, we’ve spent the last 14 years simplifying the adoption of the latest web technologies, ensuring that our users stay ahead without the complexity. From being the first to offer free SSL certificates through Universal SSL to quickly supporting innovations like TLS 1.3, IPv6, and HTTP/3, we've consistently made it easy for everyone to harness cutting-edge advancements.

CASB Requirements: What You Need to Know to Secure Your Cloud

In the modern cloud landscape, the question isn’t whether or not you need a cloud access security broker (CASB) — it’s how to choose the right one and implement it effectively. Malicious attacks are on the rise, and so are remote and hybrid workforces, making it more important than ever to be proactive about data security.