Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Automate Data Mapping for GDPR and Other Data Privacy Laws

Whether you’re a compliance expert or a novice, adhering to data privacy laws confuses even the best of companies. One of the key points of confusion is the fact that you can’t possibly comply with current and future laws without knowing what data you collect, where it goes, and how it’s used and retained. It sounds simple, but it is not. In fact, it’s a challenge that applies to nearly every organization today.

Reciprocity Wins Coveted Global InfoSec Awards during RSA Conference 2022

Last year was a record year for cybersecurity attacks, with the number of encrypted threats spiking by 167% (10.4 million attacks), ransomware attacks rising by 105% (623.3 million attacks), and intrusion attempts increasing by 11% (5.3 trillion).** Risk management is a fundamental principle of cybersecurity, which is why we are so excited to share that Reciprocity has won two Cyber Defense Global InfoSec Awards from Cyber Defense Magazine (CDM): the Hot Company – Risk Management award and the Cutti

Conti ransomware incapacitates Costa Rica's government: The FBI, CISA, the NSA, and Secret Service recommend mitigation strategies

Weeks after President Rodrigo Chaves Robles became Costa Rica’s 49th president, he had to tackle the country’s largest cyberattack ever. Costa Rica declared a state of emergency following a series of detrimental ransomware attacks carried out by the Conti ransomware gang.

South Africa's POPIA vs. EU's GDPR: What You Need to Know

It's been a while; there has been a debate between GDPR and POPIA. Both compliances have made quite a mark since their inception. The South African Protection of Personal Act, also known as POPIA, means to provide South African citizens control over their data. It also makes all organizations processing the personal information in South Africa legally responsible to protect the data.

Possible Link Between Jester Stealer and Eternity Stealer

Jester stealer is an information stealer that has been around since mid-July 2021. Originally sold by the Russian speaking threat group "Jester_Stealer", in several underground forums and Telegram channels, they operate under a Malware-as-a-Service (MaaS) model and present themselves as a group of programmers. Here we delved into the Jester stealer functionalities with a code-level analysis and highlight the possible link between Jester stealer and the new breed of Eternity stealer.

Improvements to scheduled scans, freshly added tests, and more

Getting the freshest insights on what vulnerabilities you have is essential for any vulnerability management program. Until recently, it wasn’t very clear when Application Scanning would execute a scan on an asset. This introduced unnecessary complexity for some users, particularly those with a large attack surface. Now, Application Scanning users can easily view all of the upcoming scans on a single page.

How to Protect Intellectual Property: 6+ Tips for Businesses

Data theft is a very real problem that costs businesses an average of $4.24 million annually. But it’s not just customer data that’s vulnerable, your business’s intellectual property (IP) has a hefty price tag attached to it, too. In this article, you’ll learn the definition of intellectual property, its value in business, and ways to keep it protected. Table of Contents.

How to create a continuous lifecycle for your IT Policy Management

If your organization is having trouble creating policies, I hope that this blog post will help you set a clear path. We’ll discuss setting up your organization up for success by ensuring that you do not treat your policies as a “do once and forget” project. Many organizations I have worked with have done that, but later realized good policy lifecycle is required, and a pillar of good governance.