Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Ignyte Assurance Platform Receives FedRAMP 3PAO Designation

Ignyte Platform Inc. is proud to announce that the Federal Risk and Authorization Management Program (FedRAMP) has recognized it as a designated third-party assessment organization (3PAO). This designation is over a year in the making after Ignyte announced in May of 2021 that it reached ISO 17020:2012 accreditation. FedRAMP is the United States Federal government’s way of ensuring the cloud-based products and services it uses are secure.

How B2B Brands Can Protect Critical Business Information Through Cybersecurity

With digitalization and the “upgradation” of technology, e-commerce businesses have managed to gather a huge volume of data. It is the age of the internet of things (IoT) and industry-disrupting technologies like cloud computing, big data, mobile apps, and cloud cybersecurity are now major priorities for businesses. Over the past ten years, malware infections have been on the rise, of which 92% were delivered by email.

Signicat Acquires UK-based Anti-Fraud and Identity Technology Company Sphonic

The combination with Sphonic will make the pan-European digital identity specialist better able to protect banks and other customers against fraud, financial crime, and money laundering. The acquisition creates one of the strongest identity ecosystems globally.

DevOps release process

In the previous article, we covered the build and test process and why it’s important to use automated scanning tools for security scanning and remediation. The build pipeline compiles the software and packages into an artifact. The artifact is then stored in a repository (called a registry) where it can be retrieved by the release pipeline during the release process.

LimaCharlie's Maxime Lamothe-Brassard: Rethinking how cybersecurity tools are sold - less snake oil, more focus on capabilities

In our third episode, we speak with Maxime Lamothe-Brassard — CEO and founder of LimaCharlie, a security infrastructure as a service tool that gives security teams full control over how they manage their security infrastructure. Maxime’s unique perspective comes from a career in security, including Canada’s NSA, Arc4dia, and the early days of CrowdStrike and Google Chronicle.

E-commerce Website Security: 5 Threats & Security Solutions

E-commerce companies are among the businesses most at risk for cyberattacks. High-dollar customer purchases combined with easy-to-hack, JavaScript-based websites are a threat actor’s dream come true. Building a solid e-commerce program means taking some time to understand e-commerce website security, including threats and protective measures.

Vulnerability Scanning & Vulnerability Management is not Hardening

As a CISO or Security Manager, you understand your organization’s need to remain one step ahead of cybercriminals searching for gaps in your security posture. The market is flooded with solutions for dealing with vulnerabilities and the challenge continues to be understanding the ways to best prioritize and manage the vulnerabilities.

Shifting to Holistic Risk Management with Cyber Risk Quantification

As malicious attackers and nation states have increasingly weaponized the cyber domain to impact private companies, the sustainability of organizations' ties to their cybersecurity is in question across all industries and sectors. There are many examples of companies going out of business as a result of a cyber attack, due to business leaders failing to wrap their arms around all the different ways that the ever evolving cyber threat landscape can impact their business.

How to Generate and Configure SSH Certificate-Based Authentication

The SSH protocol offers multiple authentication options: passwords, public keys and certificates. Certificate-based authentication is the most secure of them all, but historically, it has been the most complicated to set up. This tutorial guides you through simple steps to configure certificate-based authentication for an OpenSSH server. First, let's consider the differences between certificates and keys. As you can see, an SSH key is a binary proposition.