Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

3 Common Security Misconceptions

In the past, cybersecurity has often been seen as disconnected from the rest of the IT team, as well as from an enterprise’s core business activities. Security professionals in some organisations have been left to operate in their own organisational structures, defining and enforcing policies with little interaction with other departments.

Data Resilience for Microsoft Azure SQL Against Ransomware and Credential Compromise

In the event of a cyber attack, how confident are you that your Azure SQL data is safe and recoverable? As a commitment to cyber-proofing the cloud, we’re pleased to introduce new security enhancements to our previously-announced Azure SQL protection. Now, businesses and government agencies can further minimize the risk of data loss in Azure SQL databases and Managed Instances.

What Is Management Override of Internal Controls?

Internal controls are the processes, procedures, tasks, and activities meant to protect an organization from fraud, financial information misreporting, cybercrime, and accidental losses. A strong internal control system is also vital to maintain compliance with all applicable laws and regulations. Internal controls do, however, have one nagging weakness: management override of those controls.

NEW ionCube Encoder 12 Release with PHP 8.1 support

ionCube Encoder 12 has finally been released and supports PHP 8.1 syntax encoding! ionCube now has full support for PHP 8.1 so that you can secure your code to run with the latest version of PHP. ionCube Encoder has some pretty robust features when it comes to PHP code protection and adapting those features to new major versions of PHP can take quite some time to develop!

Everything you need to know about the new features in VSS & MVP

Since AT&T launched its Vulnerability Scanning Service (VSS) in 2012, in partnership with DDI/HelpSystems, over 30 million devices have been scanned. The VSS provides vulnerability management services that help organizations identify vulnerabilities on their network and manage their swift remediation. Similarly, the AT&T Managed Vulnerability Program (MVP), launched in late 2020, allows organizations to assess their network without hiring IT professionals.

Current Cyber Security Trends Pt1

As we pass the halfway point of 2022, it’s worth taking a look at the current trends which have been present within the cyber security world and what to look out for in the future. Being aware of trends allows organisations to plan for the future and put processes or defences in place before they’re required.

Installing multiple Snyk Kubernetes controllers into a single Kubernetes cluster

Kubernetes provides an interface to run distributed systems smoothly. It takes care of scaling and failover for your applications, provides deployment patterns, and more. Regarding security, it’s the teams deploying workloads onto the Kubernetes cluster that have to consider which workloads they want to monitor for their application security requirements.

Stay Vigilant: How Cloud Interconnectivity Is Amplifying the Effects of Phishing

It seems like every week another household brand announces that they’ve been the victim of a data breach. Recently, cloud communications company Twilio announced that its internal systems were breached after attackers obtained employee credentials using an SMS phishing attack. Around the same time, Cloudflare, a content delivery network and DDoS mitigation company, reported that its employees were also targeted but their systems were not compromised.

Making the Vendor Questionnaire Process More Efficient (in 2022)

Vendor security questionnaires are frustrating, both to the organizations sending them and the vendors receiving them. While these frustrations remain unaddressed, they will only continue to impede the efficiency of vendor risk management programs. Fortunately, suffering through security assessments isn’t an unavoidable by-product of a Vendor Risk Management program. With the correct strategies, you can streamline the entire assessment questionnaire lifecycle. Read on to learn how.