Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How Can CISOs Elevate Their Contribution Within the C-suite?

Businesses manage a series of balancing acts every day—between innovation and reliability, for instance, investment or profit, speed or security. Each leader contributes to how decisions are weighed and made, and traditionally CISOs have been expected to operate at one end of that scale, as the chief protector of the business.

Gaining Network Transparency with Asset Discovery and Compliance for IT/OT

I recently came across the "Johari Window Model" and thought this would be a good way to gain inspiration to explain the conundrum faced by many cybersecurity customers. The table below shows us the breakdown of the stages that are applicable not just to IT and OT environments but also to other facets of our daily lives. This model can be applied to asset discovery and Fortra's Security Configuration Management (SCM) system.

Configuring Maximum Security Log Size

Setting the maximum log size for event logs is crucial for your security policy. Proper configuration helps detect attacks and investigate their sources. Insufficient storage can result in information loss and undetected breaches. This article covers everything you need to know about configuring maximum security log size. Server hardening can be labor-intensive and costly, often causing production issues.

Cyber Security Report Examples (3 Common Styles)

Cyber security reports are an invaluable tool for keeping stakeholders and senior management informed about your cyber security efforts. This post outlines examples of some of the most popular reporting styles, with a particular focus on a field of cybersecurity drawing increasing interest among executive teams - Vendor Risk Management. Each of the cyber security report examples in this list have been pulled from the UpGuard platform.

Web Scraping Best Practices: Good Etiquette and Some Tricks

In this post, we’ll discuss the web scraping best practices, and since I believe many of you are thinking about it, I’ll address the elephant in the room right away. Is it legal? Most likely yes. Scraping sites is generally legal, but within certain reasonable grounds (just keep reading). Also depends on your geographical location, and since I’m not a genie, I don’t know where you’re at, so I can’t say for sure.

Top 10 Online Resources for Parents to Educate Themselves About Internet Safety

In today's digital age, ensuring internet safety for children is more critical than ever. The online world offers a vast landscape of opportunities and information, but it also exposes kids to harmful online content that parents need to guard against. Here, we aim to equip parents with the best online resources to educate themselves about internet safety. We'll explore a variety of tools, guides, and courses that provide essential knowledge and strategies to keep your children safe online.

How to Use Facial Recognition for Face Search

The lives of modern people are becoming increasingly comfortable and productive, all thanks to the rapid advancement of innovative technologies. Nowadays, to communicate with acquaintances, make purchases, and pay for services, all you need to do is connect your device to the internet. Have you lost contact with an old acquaintance? This is easily remedied by Face search person by photo. The principle of search work is as simple as possible. To get the necessary information you should simply upload a photo to the search engine.

Navigating the Hybrid Workplace: Balancing Productivity, Efficiency and Security

In today's digital workplace, we rely heavily on a wealth of collaboration solutions; in fact, these tools have become ingrained and part of our daily workflows. Despite hybrid working patterns and the return, for some, to a more traditional work environment, the continued reliance on collaboration apps remains strong. This presents opportunities and challenges for the IT teams tasked with onboarding and offboarding employees and effectively managing an ever-growing plethora of tools and apps.

What Are the Benefits of FedRAMP Certification in 2024?

FedRAMP, the federal risk and authorization management program, is a comprehensive and structured way to develop a security – mostly cybersecurity – position when working with the federal government. It’s a framework meant for contractors and third-party businesses that handle information for the government and who need to keep it secure. The question is, if you’re a cloud service provider, what are the benefits of implementing FedRAMP?

Learn about ISO 27001 Penetration Testing and its requirements

ISO 27001, the internationally recognised standard for information security management systems (ISMS), provides a framework for organisations to protect their valuable information assets. Penetration testing is crucial in preventing data breaches and maintaining the business’s reputation. ISO 27001 strongly recommends it as a critical tool for assessing an organisation’s security posture and ensuring compliance with control A.12.6.1, which focuses on managing technical vulnerabilities.