Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Securing Critical Infrastructures in Germany: Navigating KRITIS Regulation

Germany is widely acknowledged as one of the most technologically advanced nations. However, this prominence also implies a significant reliance on its critical infrastructures (KRITIS), which are essential to the smooth operation of the state and society. To safeguard these infrastructures, Germany has enacted new laws, IT Security Act 2.0 and KRITIS Regulation 2.0, that aim to improve the security of IT systems.

Mobile threat defense or bust

Unified endpoint management (UEM) has played a significant role over the years in enabling companies to improve the productivity and security of their corporate mobile devices and applications. In the early days of endpoint management there were separate workflows and products as it pertains to traditional endpoints, such as desktops and laptops, versus mobile devices.

Phishing Campaigns Targeting Microsoft Login Credentials Jump an Unprecedented 6100%

Monitoring of traffic to phishing pages hosted on the free hosting service Cloudflare R2 show an unheard of spike of 6100%, many going undetected by many security solutions due to the evasive techniques used. I can’t remember a time when I’ve covered a story and the reported increases were as large as the recent spike in malicious network traffic observed by Netskope.

Data Breaches Involving Social Engineering Attacks Take Longer to Identify and Contain

Continuing coverage of IBM’s recently-released Cost of a Data Breach report, we focus on the impact attacks involving social engineering have on data breach costs. There are two reports every year that we cover on this blog that you should be reading – Verizon’s Data Breach Investigations Report and IBM’s Cost of a Data Breach report. Each of these reports has been published for years, providing insight into how the state of data breaches are changing.

LinkedIn Deception: How a Chinese Spy Tricked Thousands of UK Officials

In last few years, cyber espionage has taken a new form. A recent investigation by The Times has unveiled a Chinese intelligence officer's extensive use of LinkedIn to target UK officials. Operating under the alias "Robin Zhang," this spy has been luring thousands of officials, scientists, and academics to hand over state secrets and sensitive technology information.

Phishing Tops the List as the Most Costly Initial Attack Vector in Data Breaches

After you come to grips with the massive average cost of a data breach to an enterprise organization measured in the millions, it’s time to look at the factors that increase – and lower – that cost. According to IBM’s recently-released 18th edition of their Cost of a Data Breach Report, we find that this year’s average cost is $4.45 million. That’s a staggering number, but what about the contributing factors?

Cybersecurity's Crucial Role Amidst Escalating Financial Crime Risks

In an era of escalating financial crimes, the spotlight shines brightly on the rising concerns in the realm of cybersecurity. According to a recent survey, a staggering 68% of UK risk experts anticipate a surge in financial crime risks over the next year. These apprehensions echo globally, with 69% of executives and risk professionals worldwide foreseeing an upswing in financial crime risks, predominantly fueled by cybersecurity threats and data breaches.

5 Best Tools For AWS Penetration Testing This 2023

AWS Penetration Testing is an evaluation of the security posture of a system or application to identify and mitigate potential vulnerabilities that can be exploited. It helps organisations defend against malicious attacks by identifying misconfigurations, weaknesses, and other threats in their cloud environment.

Traditional WAN vs. SD-WAN: Everything You Need to Know

The corporate WAN connects an organization’s distributed branch locations, data center, cloud-based infrastructure, and remote workers. The WAN needs to offer high-performance and reliable network connectivity to ensure all users and applications can communicate effectively. As the WAN expand to include SaaS applications and cloud data centers, managing this environment becomes more challenging.

Unified Strategies Across IT and Security for Cutting-Edge Detection, Investigation and Response

Digital transformation is happening. Organizations around the globe have realized that if they do not rapidly digitize their business operations and processes, they will be left behind — unable to compete, grow, and thrive. As such, organizations are developing and deploying new applications and services to fuel this evolution.