Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Differences Between VM Snapshots and Backups

Backups and snapshots are two popular technologies that enterprises use to mitigate data loss and minimize disruptions. In fact, backups and DR remain a top priority for organizations in 2023 to protect their data and mitigate the consequences of cyber threats and other incidents. Snapshots and backups may seem to serve the same purpose at first glance since they both allow you to recover data. However, snapshots are not a replacement for backups.

TrustedInstaller - with great power comes great responsibility

TrustedInstaller is a Windows system account with special high-level permissions allowing it to modify certain system files, folders, and registry settings. It also prevents any account including administrator accounts from modifying these files and folders. Trustedinstaller.exe is a Windows Module Installer service, a part of Windows Resource Protection (WRP), which restricts access to core system files and folders preventing them from being modified or replaced.

A look into Web Application Security

In today's digital age, web applications are the backbone of many businesses, supporting and managing a vast array of sensitive information, from personal details and financial records to critical business data. When we think about any company that we want to know more about, the most common question is: “what is their website”? But web applications are not just about traditional websites, they encompass far more than just the pages you go to when browsing the Internet.

Securing Infrastructure in Healthcare: Reducing Breaches and Building Resiliency

Telehealth and remote patient monitoring solutions enable healthcare providers to deliver care beyond traditional clinical settings. However, developing and deploying these digital healthcare solutions involves navigating complex challenges, particularly regarding data privacy and regulatory compliance. Ensuring adherence to HIPAA regulations while securely managing remote infrastructure adds layers of complexity for healthcare IT, security, and engineering teams.

API Attack Surface: How to secure it and why it matters

Managing an organization’s attack surface is a complex problem involving asset discovery, vulnerability analysis, and continuous monitoring. There are multiple well-defined solutions to secure the attack surface, such as extended detection and response (EDR or XDR), security information & event management (SIEM), and security orchestration, automation & response (SOAR); despite that, these tools often do not prioritize APIs.

Introducing the Mend AppSec Platform

According to Dimension Market Research, the global Application Security Market size is projected to “reach USD $9.6 billion by 2024 and is further anticipated to reach USD $47.3 billion by 2033 at a CAGR of 19.4%.” However, companies confront extensive barriers when developing reliable application security programs.

What is SIEM in cyber security? Definition & Meaning.

Security Information and Event Management (SIEM) is a critical tool in modern cybersecurity, combining Security Information Management (SIM) and Security Event Management (SEM) to provide real-time monitoring, threat detection and incident response. Obrela’s SIEM solutions collect and analyse security data from various sources to provide a comprehensive view of the security landscape.

Using Honey Tokens for Threat Detection with Netwrix Threat Manager

Today, cyberattacks are no longer a matter of if, but when. Spotting malicious actors before they can do damage requires a proactive approach. One effective strategy is to use honey tokens. This article explains what honey tokens are and how Netwrix Threat Manager enables organizations to easily create and use them to gain the threat intelligence they need to shut down attacks and improve their security posture.

Account Takeover Protection: What It Is and How It Combats ATO Fraud

Think about how many employees work at your organization. Now think about how many sensitive files each one can access. A single compromised user account could lead to an extortion scam, a ransomware attack, or even a data breach. If you haven’t reviewed your account takeover protection protocols in a while, now is the time. Account takeover (ATO) protection is not a single countermeasure, but rather a whole set of cybersecurity measures.