Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How to Record SSH Sessions and Monitor User Activity in Linux with Ekran System [Hands-on Guide]

Monitoring user activity on your critical endpoints is a vital part of an effective cybersecurity strategy. Organizations need to monitor both remote and local user sessions to ensure user accountability, manage cybersecurity risks, enable prompt incident response, and comply with relevant cybersecurity laws and regulations. This is a step-by-step guide on how to monitor user activity in Linux and record remote SSH sessions on any endpoint with the Ekran System software agent installed.

What is Identity Theft Insurance? Is it Worth It?

When a data breach happens, criminals may instantly expose millions of personal, financial, and medical information. They can then use that compromised data to break into other systems, help commit consumer frauds schemes, or be sold to the highest bidder. If that compromised information also contains personally identifiable information (PII), those exposed may fall victim to identity theft.

DFARS 7012 Class Deviation and NIST 800-171 Rev 3 Guidance for DIBs

NIST 800-171 revision 3 was released on May 14, 2024, prompting DoD to issue an indefinite class deviation for DFARS 252.204-7012, Safeguarding Covered Defense Information and Cyber Incident Reporting (DFARS 7012). US Defense Industrial Base (DIB) contractors must now comply with NIST SP 800-171 revision 2 rather than the version in effect at the time the solicitation is issued, as was previously required.

The UK's Cybersecurity: Where Is it and Where Is it Going?

In early April this year, the UK's Department for Science, Innovation and Technology (DSIT) released its Cybersecurity Breaches Survey 2024. It provides a comprehensive overview of the UK's cybersecurity landscape, exploring the different cyberattacks and cybercrimes businesses, charities, and private sector educational instructions face, the impacts on these organizations, and how they respond. The report is a valuable resource for the cybersecurity community.

Top 10 FFXIV Items to Have In Your Inventory: Gear, Mounts, and Weapons

The world of Final Fantasy XIV (FFXIV) is vast and filled with an endless array of items to collect, from powerful gear and weapons to unique mounts, minions, and more. As you start on with your adventures across Eorzea and beyond, effective inventory management becomes crucial. Having the right items at the right time can make all the difference in your journey. In this article, we'll go through the 10 must-have items that every FFXIV player should strive for. Let's begin.

How to Spot and Avoid the Most Common Online Scams

In 2024, online scams continue to run rampant, with cybercriminals constantly adapting their tactics to exploit unsuspecting victims. From phishing emails and fake websites to social media fraud and pop-up scams, the digital landscape is fraught with potential pitfalls. While scammers are always developing new schemes, many of these online traps share common red flags that savvy internet users can learn to spot.

The Cyber Security Risks of The Remote Work Revolution

The COVID-19 pandemic kickstarted a seismic shift in how we work, transforming remote work from a niche arrangement to a mainstream necessity. While this shift has unlocked numerous benefits such as increased flexibility, reduced commute times, and enhanced work-life balance, it has also exposed organisations to a new array of cyber security risks. Cyber attacks were expected to have cost the world $8 trillion USD in 2023, with that number expected to rise to $9.5 trillion in 2024 and $10.5 trillion in 2025.

Important Security Defenses to Help Your CISO Sleep at Night

This is Part 13 in my ongoing project to cover 30 cybersecurity topics in 30 weekly blog posts. The full series can be found here. If you search recent cybersecurity news it's easy to find the threats that keep your CISO awake at night. While there are many, a short list is: However, it's quite a bit harder to find articles discussing defenses against these attacks, so let me help out by offering a select set of security best practices that, if properly deployed, should help your CISO sleep at night.

The Meaning of Two-Factor Authentication (2FA): How to Turn On and Turn Off

Cyber attacks are a growing threat to all industries, nations, and people. They occur with increasing frequency, with the last year reporting 3,205 data compromises and over $12.5 billion in projected losses, according to the Federal Bureau of Investigation (FBI). The more often data breaches occur, the more at-risk individuals and organizations become. There are many ways to help prevent and defend against data compromises, but some of the most effective methods also hinder consumers.