Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How can we turn a hacker's toolkit against them?

Hackers use many tools at each stage of an attack. These tools are often readily available online, both free of charge and to buy, and easy to use for non-technical cybercriminals. Understanding a hacker’s tools and tactics is essential for cyber security practitioners and vendors aiming to build effective defenses and stay one step ahead of a quickly evolving host of cyber threats.

81.65% of cyberattacks target schools, how can we make sure hybrid education is secure?

Accelerated digitalization due to the pandemic and the need to adapt quickly to distance learning made schools the perfect target for cybercriminals. Moreover, compared to universities and based on disadvantages in terms of available technology and skills, primary and secondary education was even less prepared to meet the new security challenges posed by increased exposure and heightened risks.

Jay Thoden Van Velzen: How to prepare your security operations for a multi-cloud future

In our 10th episode of the Future of Security Operations podcast, Thomas speaks to Jay Thoden Van Velzen, Multi-cloud Security Operations Advisor at SAP. Prior to Jay’s current role, Jay scaled the Security Development Operations (SecDevOps) team from five to 25 team members across three continents and five countries and was the Initiative Lead for multiple security improvement programs for multi-cloud across SAP. Topics discussed in this episode.

Interview With Co-Founder Israël Hallé

For the next instalment in our series of interviews asking leading technology specialists about their achievements in their field, we’ve welcomed Israël Hallé, Co-Founder of Flare Systems. Israël’s experience includes working with the Merchant Protection and Checkout team at Shopify. After that, he was a malware analyst and a reverse engineer at Google where he hunted down new malware threats and introduced automation operations through big data analysis.

Google Play Store Announces New Standards In Countering Misinformation And Improving Security

Google has unveiled new Play Store policies designed to reduce the spread of misinformation, limit advertiser behaviour, address alarms, VPNs & impersonation issues and enhance security. The app marketplace is constantly in flux, and app store proprietors must adjust their policies accordingly to keep up. Today, Google announced a bevy of Google Play Store policies that will go into effect over the coming months.

The Threat of Ransomware to Businesses

Almost every business needs modern technology to stay competitive in their industry. This can even include housing proprietary company information and procedures on cloud platforms. Despite the business advantages digital transformation offers, it also opens up new risks you need to effectively manage. One risk that needs to be managed is the threat of a ransomware attack.

The Price Cybercriminals Charge for Stolen Data

For the price of a Starbuck’s Caramel Frappuccino Grande and a cheese Danish, about $8, a cybercriminal can obtain all the information needed to max out a person’s stolen credit card and possibly steal their identity. This is just one example dredged from the Dark Web by the elite Trustwave SpiderLabs team while it was conducting research for an exhaustive study into what cybercriminals charge for stolen records.

Synthetic Identity Fraud : How AML/CFT compliance can help in building brand trust

Identity fraud has been a significant threat to businesses. Industries related to finance and financial institutes, tourism, and hospitality are the most affected by this. Although scammers use various methods and tricks for identity theft, synthetic identity is a major concern and is a popular trend amongst fraudsters. Synthetic Identity Theft is a complex form of theft in which the person’s identity is imitated.