Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How to check if a company is legitimate: a step-by-step guide

Find out which verification methods to use — and how a KYB tool can streamline the process. Joshua Rodriguez is a product marketing manager at Persona focused on our Graph product and financial institution and public sector verticals. You'll find him around the Bay Area exploring museums with his wife and young daughter. Joshua Rodriguez is a product marketing manager at Persona focused on our Graph product and financial institution and public sector verticals.

Understand How Internet Exposure Impacts Vulnerability Management and Cyber Risk

As organizations continue to embrace digital transformation, their infrastructure increasingly spans cloud environments, third-party integrations, and remote work setups. This shift enhances efficiency and productivity—but also broadens the digital attack surface, creating new points of exposure to the public internet.

Major cyber attacks and data breaches of 2024

As 2024 draws to a close, the cybersecurity landscape continues to evolve, marked by both familiar adversaries and emerging threats with newer technologies and improved tactics. Rather than merely cataloguing breaches, we look into the anatomy of significant cyber attacks, associated vulnerabilities that led to such events, and relevant controls. We’ve chronicled key developments month by month, offering a comprehensive view of the cyber attacks of 2024 narrative that would help you learn lessons.

Password vs Passphrase: What's the Difference and Which is Better?

It’s almost impossible to use the internet without setting up a password, they are the heart of managing our accounts online. We all know the importance of preventing access to our accounts. Unfortunately, passwords are always at risk from hackers trying to access our accounts. Even if you have the strongest password available, with one accidental click on a phishing email or spoofed website, we could accidentally give cybercriminals access to our accounts or sell our accounts on the dark web.

The Rise of Security in Today's Technology Era

In today's connected world, security is one of the most crucial fears for both people and institutions. With the increase in internet use, digital transformation as well as new technologies such as cloud computing and the Internet of Things (IOT), cyber threat attack surface has increased substantially. Cybercriminals, hackers, and other malicious actors are increasingly faced with the need to secure these assets from them as more data and processes go online, thus making it a more complex endeavor.

How AI-Powered Digital Signage is Enhancing Customer Experience

In the early years of the 21st century AI digital signage software has become and is increasingly a transformative force in the way that businesses choose to interact with their customer. Businesses strive to create more personalized, dynamic experiences that cater to more individual needs and preferences in real time. Through analyzing gathered customer data and updating/adjusting content in response, retail spaces, hospitality venues and public transport hubs alike can be taken to the next level.
Featured Post

Building a Modern Identity Capability to Tackle DORA

Hackers are quickly taking advantage of every vulnerability in an organisation's armoury, particularly exploiting poorly managed identities. An organisation might have the strongest firewalls, encryption, anti-malware, vulnerability scanners, and risk management tools in the world, but if identities are not managed securely, this still leaves one critical gap in its cybersecurity arsenal.

JumpCloud Announces Its First Free Virtual Conference for IT Professionals

JumpCloud Inc. has opened registration for JumpCloudLand, its first-ever user conference taking place on 28th January 2025. JumpCloudLand is a free virtual event for IT professionals. It offers everything IT teams need to build skills, stay ahead of industry trends, and unlock opportunities for professional and organisational growth. Attendees will have the chance to meet industry leaders, exchange ideas with peers, and discover innovative ways to drive success for their teams and businesses.

Beyond Compliance: Building a Resilient Security Strategy with the ISM and Essential Eight

In today’s complex cybersecurity landscape, addressing the controls within the Australian Government’s Information Security Manual (ISM) and the Essential Eight (E8) is critical when seeking to build rapport and work with the Australian Government. Australian cybersecurity regulations like the ISM and E8 outline foundational steps, including cybersecurity best practices and controls for data protection strategies.