Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Just-in-Time Administration for Secure Access Management

Although external cybersecurity attacks and malware make for sensational headlines, the biggest security threat most organizations face comes from trusted insiders with privileged access to sensitive data. Cybersecurity Insider’s 2020 Insider Threat Report reveals that 68% of organizations report that insider attacks are becoming more frequent and that they feel vulnerable to them.

Protect Your Business from Ransomware as a Service

Cloud-based business models such as infrastructure as a service and software as a service have balloon in popularity, gaining mainstream acceptance in recent years. Cloud providers benefit from superior economic models that scale while also reducing their development risk and complexity. However, with success comes attention, so it’s only logical that criminals have emulated these models.

Fortinet, potential vector for Lockbit ransomware attack against Accenture

Accenture has acknowledged that it was the victim of a ransomware attack on July 30 in what it described as a "security incident." As reported by Cyberscoop, the hackers (a gang known as LockBit) began leaking stolen data and threatened to release further compromised information. LockBit first emerged in 2019 and its ransomware cyberattacks primarily target large corporations, from which it hopes to extort large sums of money.

Protect sensitive data with the right balance of AppSec tools and services

Using the right AppSec tools and services throughout the software development life cycle can help you properly secure your sensitive data. One of a CISO’s primary responsibilities is protecting their company’s digital assets, and adhering to current and emerging data privacy laws is crucial. Organizations must ensure that their corporate intellectual property and user data (e.g., customer, employee, contractor and/or prospect data) is safe from cyber attacks and data breaches.

HTTP/3 and QUIC: A new era of speed and security?

HTTP/3 is the third and upcoming major version of the Hypertext Transfer Protocol (HTTP) used across the web.HTTP has been the main protocol on the internet since the 1990s, with the second release (HTTP/2) introduced in 2015 as a major update with many new features. Whilst request methods and status codes will remain the same, HTTP/3 makes a departure from its predecessors by not using the Transport Control Protocol (TCP) as the underlying transport layer.

High Street Capital Acquires Controlling Share in NeoSystems

TYSONS CORNER, Va., September 8, 2021 – NeoSystems, a full service strategic outsourcer, IT systems integrator and managed services provider to the government contractor market, announced today that it is being acquired by High Street Capital, a Chicago-based private equity firm. Financial terms of the deal were not disclosed. The company will continue to be led by NeoSystems CEO and Co-Founder, Michael Tinsley, and Co-Founder and CTO, Rob Wilson, along with its current management team.

What You Need to Know About NERC CIP Compliance

Utility companies are increasingly being targeted by cybercriminals. Although the highest profile utility cyber attack in recent memory was the May 7 ransomware attack on Colonial Pipeline that caused gas shortages on the East Coast, power companies of all kinds are popular with criminals for a reason: they can’t afford a shutdown and they have the money to pay a ransom.

Explore and experience cybersecurity from a consulting point of view

The demand for highly qualified staff with the right skill sets along with hands on experience is not new news in cybersecurity. However, the difficulty of gaining experience prior to meeting the objectives for interviews for entry level jobs can be a tough hill to climb. Ample resources available online, including the ability to set up in-home labs, which helps.