Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

What Is EDR Security?

Back in 2013, Gartner’s Anton Chuvakin set out to name a new set of security solutions to detect suspicious activity on endpoints. After what he called, “a long agonizing process that involved plenty of conversations with vendors, enterprises, and other analysts,” Chuvakin came up with this phrase: endpoint threat detection and response.

Elastic Security excels in the AV-Comparatives Business Security Test

Elastic Security has exceptionally powerful capabilities that surpass those of smaller vendors Elastic Security has achieved remarkable results in the recent AV-Comparatives Business Security Test, ranking in the top five with other notable security vendors. Elastic Security was identified as being in the larger end of the market and offers exceptionally powerful tools with capabilities that surpass those of smaller packages.

How To Detect & Prevent Employee Fraud in 2024

You’ve worked tirelessly to build your business, carefully assembling a team you trust. However, even the most successful companies face an unsettling reality—the risk and the impact of employee fraud. Occupational fraud costs businesses up to 5% of annual revenue, with $3.1B lost to fraud in 2024. Here, we discuss practical strategies for detecting and preventing employee fraud. We look at various types of fraud, red flags to watch for, and prevention tactics to protect your business.

Phishing Awareness Training: 10 Reasons Why Yours Isn't Working

Phishers are in the business of deception. They trick unsuspecting individuals into compromising sensitive data, potentially bringing an entire organization to its knees. Awareness training for employees is one of the most important tools a company can use in its anti-phishing strategy. However, it also has its downsides. Some of these flaws can, and should be fixed. Others leave no choice but to complement training with additional anti-phishing tools.

Avoiding Scams During the 2024 Paris Olympics

Breakdancing is coming to the world stage while French citizens stage a creative protest with the hashtag “JeChieDansLaSeineLe23Juin.” We’ll leave the dirty research on that to you. Regardless, the ramp-up to the 2024 Paris Olympics is proving to be an exciting and controversial affair. However, the Olympic call isn’t reserved for top athletes and sports enthusiasts. It’s also a prime opportunity for scam artists and fraudsters to exploit an influx of tourists.

How to Implement Cyber Security Monitoring in 2024

Cyber security monitoring refers to the continuous observation and analysis of an organisation's network and information systems to detect and respond to security threats. It plays a vital role in protecting sensitive data and preventing data breaches, making it an essential practice in 2024. In today's digital landscape, the frequency and sophistication of cyberattacks have dramatically increased.

Combating Misinformation and Deep Fakes in Elections and Business: Q&A with David Fairman & Shamla Naidoo

Technological advances in how we create and consume media have repeatedly transformed how election campaigns are fought: social media, TV and radio were all revolutions in their times.There have always been concerns about the impact these new technologies would have on democracy: the Milwaukee Journal worried following the first televised presidential debate, in 1960, that “American Presidential campaigning will never be the same again.” Perhaps they were right…

The New York State Law on Data Security Breach Notification for Business Owners

A data security breach occurs when an unauthorized party accesses or acquires computerized data without valid authorization from the right source. This act is against the stance of a business that guarantees integrity, confidentiality, and security of sensitive information such as social security number, name, account number, driver's license number, biometric information, and debit/credit card details. Some laws and regulations mandate business parastatals to notify the state and their customers whenever a data security breach occurs.

Internet Safety at Sea: How to Stay Secure While Cruising

Staying connected while on vacation has never been easier. Even when sailing the ocean waves on a cruise, technology allows us to stay up-to-date with our friends and family, sharing our adventures and staying in touch with loved ones on social media, by email, over messaging and chat applications, and by video.