Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

FIM Solutions: Essential Guide

Changes to your IT devices, systems and servers are inevitable — but they can introduce critical security weaknesses. A file integrity monitoring (FIM) solution will track changes to your system and configuration files so you can promptly verify patch rollouts and investigate and mitigate unauthorized modifications — helping your business maintain a strong security posture and ensure ongoing regulatory compliance.

Must Know Approaches for Maintaining Mobile Application Security and CIA Traits

Nowadays, every business wants to reach out to a larger audience. And the best way for it is Mobile App Development. Whether someone is at work, at home, or somewhere outside, people frequently go through apps on their mobiles. Such apps collect data, store it and process it to provide reliable results. Indeed, our sensitive and confidential data is also getting into the same process. Hence, it makes a top priority to focus on mobile application security.

Enterprise data encryption - the ultimate guide in 2023

There’s no denying that the market for data encryption solutions is multifaceted and broad. But, it must be in order to keep up with modern security gaps and evolving threats. In this article, we’ll tell you about what enterprise data encryption is, why you should care about it, some of the different types of data encryption, and how SecureAge takes a unique approach to effectively protect enterprise data without compromising existing workflows or requiring a tech overhaul.

How Did LAUSD Get Hacked in 2022?

Vice Society, the cybercriminal gang responsible for the attack, is believed to have used internal login credentials leaked on the dark web to access LAUSD’s network and launch the ransomware attack. Twenty-three internal LAUSD credentials were leaked on the dark web leading up to the attack, with at least one set granting access to LAUSD’s Virtual Private Network (VPN).

What Caused the Uber Data Breach in 2022?

The Uber data breach began with the purchase of stolen credentials belonging to an Uber employee from a dark web marketplace. The hacker tried to log into Uber’s network with these credentials but was unsuccessful because the account was protected by MFA. To overcome this security barrier, the hacker contacted the employee and, while pretending to be a member of Uber’s security team, asked them to accept the MFA push notification sent to their phone.

80% of companies experience security incidents in the Cloud

Migrating to the Cloud brings many advantages for companies. First of all, they reduce their operating costs by almost 40%. They also increase their agility, reduce the maintenance time of traditional IT infrastructures, and gain flexibility and scalability. However, as the number of workloads deployed in the Cloud grows, more and more organizations are struggling to keep pace with security requirements.

Regulatory Compliance in the Telecom Industry

The increasing use of cell phones has automatically led to unimaginable height of sharing of personal information online. Most routine actions, from providing information over the phone to opening a bank account to placing food orders, may now be accomplished from the convenience of your own home. While the telecom sector has enabled remote procedures, it has also hastened the spread of identity fraud and financial schemes.

Meeting PCI DSS Compliance with Styra DAS + Kubernetes

DevOps and platform teams are more strained than ever, and as a result, need better tools than ever. These teams are required to develop, provide access to, and secure a number of resources — while remaining good stewards to application developers. Beyond that, they are often tasked with overseeing their organization’s shift to the cloud. And as that shift takes place, DevOps teams will need to shift their compliance standards to the cloud.

Weekly Cyber Security News 18/11/2022

A selection of this week’s more interesting vulnerability disclosures and cyber security news. For a daily selection see our twitter feed at #ionCube24. Normally the articles I share come as some surprise. This week I don’t think any one of them meets that criteria…. So let’s start with the first non-surprise then… With silly shopping season ahead of us it comes are utterly no surprise that eCom stores are under attack.

Evolution of the SOC - From the Dark Ages to Enlightenment, shifting to an agile threat informed cyber defense program

Evolution of the SOC – From the Dark Ages to Enlightenment, shifting to an agile threat informed cyber defense program How important is the Security Operations Center (SOC) to a business and a security leader's overall success? The answer is a bit cloudier than one would believe, given the length of time the SOC has been part of our security program lexicon.