Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Sponsored Post

The Importance of Penetration Testing for Your Business

Did you know that a third of all businesses will experience a cyber-attack this year? And that's just the ones that are reported! The fact is, if you're not doing penetration testing on your business, you're at risk. In this blog post, we'll break down what penetration testing is and why it's so important for businesses. We'll also discuss the risks of not having security testing done, and how it can impact your bottom line.

Stories from the SOC - Lateral movement using default accounts

The Windows ‘Administrator’ account is a highly privileged account that is created during a Windows installation by default. If this account is not properly secured, attackers may leverage it to conduct privilege escalation and lateral movement. When this account is used for administrative purposes, it can be difficult to distinguish between legitimate and malicious activity.

Adjusting to New Cybersecurity Regulations in 2022

Cybersecurity is a leading concern for businesses in 2022. As organizations have embraced rapid digitization, cybercrime rose alongside it, quickly illuminating how many security standards fall short. It also became evident how cybersecurity regulations need to expand to address today’s challenges. Here’s a closer look at how this regulatory landscape is shifting, why, and what businesses can do in response.

How to setup Dynamic Keys in ionCube Encoder

Learn about ionCube’s most powerful feature, Dynamic Keys! In this article we will show you how to add a dynamic key based on a static value as well as the more advanced (and recommended!) non-static dynamic key! If you don’t already know about external and dynamic keys in ionCube then it would be best to start with our summary article to learn about how each feature works. We also show you how to setup a simple external key here.

Understanding Suspicious User Types With UEBA

The cybersecurity threat landscape is evolving rapidly. Hackers and other malicious users are becoming increasingly sophisticated in their attack methods, rendering traditional security tools obsolete. Modern cybercriminals will use any means to break into firewalls, send emails with infected attachments, or even bribe employees to share login credentials. Businesses in all industries must identify and implement comprehensive IT security tools and strategies to protect their valuable assets.

SecureAPlus users upgrade FREE to CatchPulse

SecureAge Technology recently announced the relaunch and renaming of SecureAPlus which is taking place in May 2022. The new upgraded version is now known as CatchPulse. In this post, we would like to share with our existing home customers how this change will affect your SecureAPlus Essentials and Pro installations.

Reduce risks of data breaches throughout your development lifecycle with the new Bearer GitHub Action

Bearer is a Static Application Security Testing (SAST) tool that enables security and engineering teams to identify and mitigate data security risks throughout the software development lifecycle. It integrates with Source Code Management (SCM) software (see Git repository integrations for more details) to scan your code repositories, discover and classify data flows, and detect gaps with your data security policy.