Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Mastering modern access control with RBAC and ABAC

Managing access to resources efficiently and securely within today’s complex IT environments is paramount. Two prominent access control models, Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC), play crucial roles in this endeavor. Understanding their relationship and how they can be integrated is essential for optimizing security and operational efficiency.

The Biggest Factors Influencing API Security Today

Application Programming Interfaces (APIs), with their ability to enable different software systems to communicate, have helped shape the digital world irrevocably. They allow developers to create more interoperable, scalable, efficient, and innovative digital services and applications across important industries such as retail, finance, manufacturing, and healthcare. However, with the explosion of API creation and usage comes inevitable risks.

Small Team Cybersecurity: Buy, Build, or Hire?

A question that all small, security-conscious organisations face is: “What's next?” They know that their antivirus (AV) is not enough. AVs detect malware through a combination of signatures, heuristics, and integrity checking. However, an AV cannot detect malware that is encrypted or that mimics trusted applications or insider threats, such as an employee exfiltrating client data to a third party. More than half of all detected malware now evades AV solutions.

The Importance of DDoS Threat Intelligence and Collaborative Data Sharing

In today’s interconnected digital landscape, distributed denial of service (DDoS) attacks pose a significant threat to organizations of all sizes. To effectively combat this ever-evolving menace, there is a critical need for DDoS threat intelligence and collaborative sharing of data. We’ll explore the importance of DDoS threat intelligence, the benefits of collaborative data sharing, and the collective effort required to mitigate the impact of DDoS attacks.

Cloud Security Managed Services: Defending the Cloud in Partnership

As cloud technologies continue to advance and more organizations shift toward cloud-based solutions, the need for stringent security measures has become increasingly vital. Effective cloud security not only protects sensitive data from unauthorized access and potential breaches, but also ensures the smooth functioning of cloud-based services.

The Role Regulators Will Play in Guiding AI Adoption to Minimize Security Risks

With Artificial Intelligence (AI) becoming more pervasive within different industries, its transformational power arrives with considerable security threats. AI is moving faster than policy, whereas the lightning-quick deployment of AI technologies has outpaced the creation of broad regulatory frameworks, raising questions about data privacy, ethical implications, and cybersecurity. This gap is driving regulators to intervene with guidance in creating standards that reduce the risks.

Espionage-Intent Threat Groups Are Now Using Ransomware as a Diversion Tactic in Cyberattacks

A new report focused on cyber espionage actors targeting government and critical infrastructure sectors highlights the strategic use of ransomware for distraction or misattribution. It was inevitable: a threat group using a secondary attack type to cover their tracks – whether those “tracks” are the groups true intent, who’s responsible – or to simply make some additional money after they’re done with the initial attack.

How to Spot and Avoid Grandparent Scams

Grandparent scams happen when a cybercriminal impersonates a victim’s family member, such as a grandchild, to convince them that there is an emergency. Despite the name of this scam, the victim doesn’t always have to be a grandparent or grandchild. The primary goal of these scams is to extort money from a victim by pretending that their loved one is in danger.

New Report: How SME IT Professionals Really Feel About Security, AI, MSPs, and More

Twice a year, JumpCloud commissions a survey of IT professionals working at small and medium-sized enterprises (SMEs). These surveys examine pressing current matters like the security landscape, emerging technologies, job outlook, and more. JumpCloud’s latest report was released on July 16. It surveyed 612 IT decision-makers in the U.K. and U.S. to get a read on the SME IT market, both today and where IT professionals think it’s headed in the future.