Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Bridging the Cyber Skills Gap for Small Businesses

Small and Medium Enterprises (SMEs) have encountered increasing burdens over the last few years, from challenging economic conditions to a dramatically evolving cyber threat landscape. Today, 43% of cyber attacks are targeted at SMEs, and only 14% of targeted SMEs were prepared to handle such attacks. An astonishing 75% of those SMEs attacked could result in permanent closure if unable to recover data.

Sharing is Not Caring: Hunting for Network Share Discovery

Organizations rely on interconnected systems to store, share and manage information. These ecosystems often incorporate network file shares, which act as repositories of various types of data within an organization. Unfortunately, it is not uncommon for sensitive files to find their way onto these network shares inadvertently with permissions that are too broad or not properly restricted.

What is Cloud Security? Types, Risks & Benefits Defined

With data breaches making the headlines almost daily, it can feel like you’re stuck in a never-ending discussion about how secure data is in the cloud. On one hand, cloud naysayers may be preaching cloud repatriation in response to the high profile cloud compromises of the last few years. On the other hand, being too sure of your data security is a major recipe for trouble — hubris has no place in cybersecurity.

What Is Zero Trust? Top Benefits & How It Works

Organizations are tasked with the continuous challenge of having to keep up with advancing cyber threats and must change their security strategies for them to remain secure. Zero Trust Security is a response that demands identity validation from all users, devices, and networks, thus eliminating implicit trust altogether.

Business Continuity Plans for Financial Institutions

Disasters rarely strike with advanced notice. That’s especially true in the business world, where there’s no such thing as a business meteorologist to forecast potential threats that may beset a company’s personnel or assets. That’s where a Business Continuity Plan comes into play.

Getting Started with Panoptica on AWS using Kubernetes Goat

In this blog you will learn how to easily secure your microservices apps running on Amazon EKS cluster using Panoptica, Cisco's cloud native application security SaaS service. We use an open source Kubernetes Goat application to see common misconfigurations, real-world vulnerabilities, and security issues in Kubernetes clusters, containers, and cloud native environments.

Cyber Criminals Targeting Victims Through Beta-Testing Apps

Cybercriminals use a variety of deceptive methods to defraud their victims. It can be challenging to keep up-to-date with the latest threats to your online security. The Federal Bureau of Investigation (FBI) has warned people about the dangers of a new threat - malicious beta-testing apps. These apps can have severe consequences for our data and finances. In this article, we'll explain how this latest attack works, the signs of a malicious app you need to be aware of, and, most importantly, what cybersecurity tools you need to protect yourself.

Navigating Online Education Challenges through Digital Identity

As the end of summer approaches, the back-to-school season ushers in a wave of students ready to embark on their educational journeys. According to Eurostat's 2020 data, a staggering 18 million students were enrolled in tertiary education in Europe, a number that continues to rise each year. Amidst this educational landscape, the digital era's expansion and the ongoing impact of the COVID-19 pandemic have fueled a surge in online learning.

Threat-Loaded: Malicious PDFs Never Go Out of Style

In the realm of cybersecurity, danger hides where we least expect it and threats never, ever, go out of style! Over the past few months, Trustwave SpiderLabs has seen a rising trend in threat actors employing PDF documents to gain initial access through email-borne attacks. Though the use of PDF files as a malicious vector is not a novel approach, it has become more popular as threat actors continue to experiment with techniques to bypass conventional security controls.

Upgrade Your Cloud Storage Experience With This Alternative to Filen

Filen is a cloud storage company founded in 2020 in Recklinghausen, Germany. Like many alternative cloud storage providers, Filen aims to provide users with complete privacy for their files, securing them with zero-knowledge and end-to-end encrypted technology. If you’re interested in learning more about Filen, we’ll discuss how they focus on protecting your privacy online, their pricing, and other features.