Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Exploring Cybersecurity in the Financial Sector: The Role of DORA and ThreatQ

As the Principal Threat Intelligence Services Engineer and Trainer at ThreatQuotient, my role puts me in front of a diverse range of clients and partners across various industries, offering me a unique perspective on the impact of regulatory frameworks on cybersecurity. Through our European Union (EU) based clients and partners, I have seen the emergence of the need to be compliant with the Digital Operational Resilience Act (DORA).

LAN Manager authentication level best practices

LAN Manager (LM) authentication level is a security setting that determines how Windows systems authenticate network connections. It is a legacy authentication protocol developed by Microsoft for use in older versions of Windows network operations. There are three main protocols involved in LAN Manager Authentication: The LAN Manager Authentication Level setting allows you to choose which protocols your system will use or accept for authentication.

How to Install PostgreSQL 16 on RHEL 9

PostgreSQL is one of the leading and widely used open source relational database management systems (RDBMS) that stores structured data in tables, just like MySQL. It is used by developers in their tech stacks and even by large enterprises and corporations to store website and application data. PostgreSQL uses SQL query language to store and manipulate data and also provides JSON support.

FAQ: What Are the DoD Requirements for Wiping Data?

In today’s digital age, destroying data is not as easy as it once was. Before the advent of computers, if you needed to destroy sensitive government information to prevent it from falling into the wrong hands, all you often needed to do was light some papers on fire. With computers, you might think that it’s a simple matter. After all, if you’ve ever accidentally deleted a file or had a hard disk crash, you’ve probably lost data and haven’t been able to recover it.

The Cybersecurity and Geopolitical Discussion - Broken China? - Episode 20

To find out, check out Episode 20 of the Cyjax Geopolitical and Cybersecurity Podcast. Here’s a summary of what’s on the table… In the latest episode of the Cybersecurity & Geopolitical Discussion, the hosts Ian Thornton-Trump CD, CISO for Cyjax, Lisa Forte of Red Goat Security and Philip Ingram MBE of Grey Hare Media, delve into the complexities of China’s image from an outsider’s perspective.

Serhii Tokarev: Diia.City United May Become Catalyst for Ukrainian Tech Prosperity

Serhii Tokarev, an IT investor and co-founder of the investment group Roosh, has announced the launch of Diia.City United, a union organized by the members of the Ukrainian tech industry aimed at creating an environment conducive to the growth of tech businesses in Ukraine.

Unlocking Business Potential: Why Custom Software Development is the Best Choice

Explore the transformative power of custom software development for businesses. This article highlights the tailored solutions offered by custom software, including scalability, flexibility, enhanced security, competitive advantage, and long-term cost-effectiveness.
Sponsored Post

Running DAST in CI/CD for Regression Testing

In the fast-paced field of software development, ensuring applications remain functional and secure through updates is essential. Regression testing, which checks that new code doesn't harm existing features, is key. Dynamic Application Security Testing (DAST) tools play a crucial role here. They identify security flaws in active web applications. This article explores the importance of DAST tools, integration, and enhancement in regression testing.

Secure your crypto: 5 tips to select the ideal wallet

Securing your digital assets is becoming more and more crucial as the use of cryptocurrency grows. Choosing the appropriate crypto wallet is one of the most important steps in managing your cryptocurrency assets. But when there are so many to choose from, selecting the right option can be difficult.