Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

The Linux process and session model as part of security alerting and monitoring

The Linux process model, available within Elastic, allows users to write very targeted alerting rules and gain deeper insight into exactly what is happening on their Linux servers and desktops. In this blog, we will provide background on the Linux process model, a key aspect of how Linux workloads are represented.

Regulatory Compliance - Holding Security Back or Forcing us to Reassess old biases?

A recent survey conducted by IBM and Censuswide of the UK market explored some of the drivers for modernisation and revealed some interesting challenges that organisations currently face as more and more businesses expand their digital boundaries.

Weaponizing paranoia: developing a threat detection strategy

Nowadays, it’s mostly a foregone conclusion that companies need a security program and centralized log aggregation and correlation platform. Unfortunately, the conversation all too often turns toward tactics for data collection and detection of specific threat actors or common vulnerabilities and exposures (CVEs).

Low-Code vs No-Code: Is There a Difference?

For organizations to be more productive and agile in their development processes, understanding the core differences between low-code and no-code applications and platforms is vital. In this article, we take a closer look at low-code vs no-code, explore the benefits of each, and explain how design flaws and security vulnerabilities in these environments are addressed.

Top 7 Vulnerability Mitigation Strategies

Discover the best vulnerability mitigation strategies to help protect your business from potential threats with this guide from the team at Reciprocity. 2021 (and every year leading up to it) was the worst year on record for cybersecurity. Since the onset of the COVID-19 pandemic, cybercrime as a whole has increased by 600 percent.

How Compliance Can Strengthen Your Risk Posture

In the age of digital business, protecting your organization’s digital assets from cyber threats and reducing your cyber risk exposure has never been more important – or more complicated. At the same time, most organizations are also required to comply with numerous industry and government regulations that dictate standards for data privacy and IT security.

Consent versus legitimate interest - know the difference

When discussing the GDPR, a common confusion we run into is the difference between consent and legitimate interest, as well as when to use them as your legal basis for collecting, processing and storing personal data. Each of these are incredibly important in ensuring you’re connecting with your prospective customers and not stalking them.

Pub Talk: IT/OT convergence, Frameworks and prevailing cybersecurity threats

When you read your favorite cybersecurity blog, do you often wonder what it would be like to sit down with the authors and get their real thoughts about some of the topics they write about? Most blogs and articles are so carefully curated, edited, fact-checked, and linked to supporting evidence that they can seem somewhat stilted, and worse, heavily contrived. Perhaps this is why meeting some of the speakers and authors at public events is so much fun.

Sponsored Post

Are disconnected RDP sessions ticking time bombs in your network?

I think we’ve all been there before – you log on to a server remotely via RDP, and do the needful – but don’t immediately log off. But then you get distracted by a phone call, an email, a chat, or a good old-fashioned physical interaction with another human being. So when it comes time clock out for the night, you shut down your computer or log off. Or maybe you’ve been working on a laptop and your VPN got interrupted.

Seamlessly Secure Your Cloud Workloads

You’ve secured your cloud identities. You’ve hardened your cloud security posture. You’ve configured strong cloud access controls. But there’s still one more thing you need in order to secure your cloud environment: a cloud workload protection platform, or CWPP. Cloud workload protection platforms secure the workloads that run on your cloud — which are distinct from the infrastructure, user identities and configurations that form the foundation of your cloud environment.