Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Is IoT Security Only as Good as The Weakest Link? A Guide to Protecting Your Security Environment In 2022

The Internet of Things (IoT) has been a rapidly implemented technology, with estimates suggesting that there will be over 50 billion devices connected to the internet by 2020. This number includes not only traditional computing devices, but also a wide range of “smart” devices including cars, appliances, and even medical implants. As these devices become more and more common, the need for effective security management becomes increasingly important.

Pros and cons of cybersecurity automation

Image Source: Pexels Cybersecurity threats are nothing new. Major corporations and small businesses alike are regularly faced with them. However, as technology continues to advance and change, so do those threats. Technological sophistication is important when it comes to providing us with the advancements we’ll eventually become used to. But that means cybercriminals are also becoming more sophisticated in their efforts. The solution? Cybersecurity has to become more sophisticated, as well.

How does Identity Verification enhance Remote Onboarding in Telecommunications?

One of the most cutthroat customer-facing sectors is telecommunications. Most customers make their choice of a new supplier in a matter of minutes solely based on first impressions and brand awareness. Every point of contact with customers must be optimised by providers, and Identity Verification is key factor. Due to a lengthy and time-consuming SIM Card registration process, many excellent brands regrettably lose clients right away.

CrowdStrike Introduces Sandbox Scryer: A Free Threat-Hunting Tool for Generating MITRE ATT&CK and Navigator Data

Threat hunting is a critical security function, a proactive measure to detect warning signs and head off attacks before a breach can occur. Scaling threat hunting capabilities involves quickly deriving actionable intelligence from a large number of behavioral data signals to identify gaps and reduce time to respond.

How to write a GDPR Data Protection Policy? Free Template

Data privacy rules have never been crucial for organisations to follow until the General Data Protection Regulation (GDPR) enforcement. This blog is divided into two sections. The first section will discuss a general overview, definitions and common queries related to a data protection policy. The second section will explain how a business can write and operationalise a data protection policy.

FBI issues warning after crypto-crooks steal $1.3 billion in just three months

Amid a wave of hacks that have cost investors billions of dollars worth of cryptocurrency, the FBI is calling on decentralised finance (DeFi) platforms to improve their security. In a warning posted on its website, the FBI said that cybercriminals are increasingly targeting DeFi platforms to steal cryptocurrency, often exploiting vulnerabilities in smart contracts to part investors from their money.

Cybersecurity Expert Interview: Dr. Joseph Burt- Miller Jr.

Introduce yourself and tell us what you do for your day job. My name is Dr. Joseph J. Burt-Miller Jr. I currently serve as Assistant Project Manager at the Department of Homeland Security. One of my main duties is handling the risk management piece for projects, so interacting with contractors and our risk owners, ensures that our risks are tracked and mitigated. Anything that needs immediate attention I bring to my leadership, my project manager and program manager, etc.

The npm faker package and the unexpected demise of open source libraries

Where do open source dependencies go to die, and why do they come to an end? What happened to the npm faker module? Can it happen again? Join me to learn how open source software libraries rise to glory and how they reach their end of life. I’ll also include some takeaways for developers and ops engineers.