Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

What is the SSL Not Available Risk?

So you've received a critical risk finding for SSL not available, which means your domain does not have an SSL certificate installed on the server. To resolve this finding, you can generate and supply an up-to-date SSL/TLS certificate on your site. SSL, which stands for secure sockets layer, and its successor TLS, or transport layer security, are internet protocols for securing traffic between systems with an encryption algorithm.

What is Risk Modeling?

Investments in effective risk management, and especially in IT systems to manage risk, have historically paid huge dividends. In a 2023 PwC US Risk Perspectives Survey, 57 percent of C-suite respondents reported seeing better decision-making capabilities thanks to investments in such applications. But there is still significant room for improvement in enterprise risk management, starting with better risk modeling and forecasting.

Leveraging Komodo Consulting's Cybersecurity Services to Comply with the NIS 2 Directive

As the digital landscape evolves, so too does the regulatory environment. One of the latest pieces of legislation to impact organizations across the EU is the Network and Information Security 2 (NIS 2) Directive. This directive, aimed at enhancing cybersecurity across the Union, has far-reaching implications for a wide range of organizations, both within and outside the EU.

ManageEngine Recognized as a Customers' Choice in 2023 Gartner Peer Insights 'Voice of the Customer': Security Information and Event Management (SIEM) for the fourth time

We’re thrilled to announce that ManageEngine has once again been recognized as a Customers’ Choice in the 2023 Gartner Peer Insights ‘Voice of the Customer’: Security Information and Event Management (SIEM). This marks the fourth time that ManageEngine has been recognized as a Customers’ Choice, which we believe is a testament to our commitment to providing our customers with exceptional SIEM solutions.

Featured Post

Helping Customers Optimise and Secure Digital Transformation

Rewind a couple of years and enterprises were heavily focused on acquiring new tech to drive forward their digitisation plans. Then, when the pandemic struck, organisations were forced to fix any technology gaps in their environment and digitise services to hastily plug these gaps. Cybercriminals - aware of the opportunity that the new remote landscape offered - were also taking advantage, quickly exploiting vulnerabilities across the digital ecosystem to infiltrate and breach organisations.

Kubernetes Security Compliance Frameworks

The challenge of administering security and maintaining compliance in a Kubernetes ecosystem is typically the same: an increasingly dynamic, ever-changing, ephemeral landscape. Changes can be rooted in new approaches to cyberattacks or changing regulations. Kubernetes security requires a complex and multifaceted approach since an effective strategy needs to.

Effective Access and Collaboration on Large Lab Datasets using Egnyte's Smart Cache

The life sciences industry is at the forefront of data-intensive research and innovation. Scientists and researchers rely heavily on the collection, processing, and analysis of vast amounts of data generated by lab instruments. And they are often challenged by errors or confusion in managing data flows that in turn, have a direct impact on the quality of data and corresponding compliance with regulatory requirements.

A Long-Running Credential Phishing Expedition

Researchers at Akamai describe a credential phishing campaign that’s been running since at least March 2022. Due to the volume of traffic to the phishing sites, the researchers estimate that the attackers are raking in up to $150,000 per year by selling the stolen credentials. “This ongoing research led to the discovery of multiple templated sites used as front-ends for the scam infrastructure that have been tied to more than 40,000 malicious routing domains,” the researchers write.

What Is Cybercrime: The Different Types You Need to Look Out For

The question “What is cybercrime?” is more critical today than ever. Advancements in tech, oversharing on social media, and even the latest AI innovations have significantly increased the risk of cyberattacks. Just look at the statistics. Ransomware attacks grew by 92.7% in 2021 compared to 2020. As internet connectivity and usage grow globally, cybercriminals are becoming more brazen in targeting unsuspecting victims.