Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Effectively meeting and exceeding the requirements of the SAMA Cyber Threat Intelligence Principles

Responsible for supervising nearly $1Trillion of assets across 30 banks and financial institutions, SAMA plays a crucial role in ensuring economic and financial stability within the Kingdom of Saudi Arabia. The SAMA Cyber Security Framework and Threat Intelligence Principles are mandatory regulations for all member organisations regulated by the Saudi Arabian Monetary Authority (SAMA) operating within the Kingdom of Saudi Arabia.

Software Developers FAQs on Why to Sign My Code

As a developer, you must have asked, “Why Should I Sign My Code?” when anyone enters into software development, then only they heard about the term – code signing. And then people understand the importance of a Code Signing Certificate. But, the query continues beyond just understanding the definition or using a certificate to sign software digitally. There are a lot more aspects that a developer must know from the questions getting raised by developers present globally.

The SPoF that is DNS

The idea behind “SPoF,” or “Single Point of Failure,” is that if one part of a system fails, then the entire system fails. It’s not desirable. In IT and security circles, if a system or application can be disrupted or degraded severely by the failure of just one component or subcomponent, then we usually deem the design to have a flaw.

Data protection: stricter rules call for an advanced security posture

Data privacy is still unfinished business for many companies. With data privacy laws expanding and tightening globally, compliance has become a complicated process that affects all areas of an organization. Gartner predicts that by 2024, 75% of the world's population will have their data covered by some privacy regulation.

Face Verification: How IDcentral's Face Trace works

Remote, Digital Onboarding is now deemed a “car in the garage” solution to onboarding new customers online. This typically contains a form of Government ID verification and Biometric Check before secure signup(Face Match). But the ” new car in the showroom” solution that you desire is IDcentral’s Face Trace product.

How End-to-End Encryption in Messaging Apps Benefits Your Business

Encryption means converting data (in the form of plain text) into a code that is unreadable by humans to prevent unauthorized access. There are many types of encryption, and they include encryption in transit, encryption at rest, and end-to-end encryption. Among them, end-to-end encryption is probably the best for communication services.

How to Test a Java Application

Creating effective test cases and the right testing strategy for Java applications can be a time-consuming and complex task. This is where specialized testing solutions come in. With the right setup, developers can catch bugs early in the development process, before they become more difficult and expensive to fix. Additionally, testing methods can help identify and mitigate security vulnerabilities, which is critical for protecting sensitive data and maintaining the integrity of the application.

Building a Modern Application Security Strategy. Part One: Threats, Opportunities, and Challenges

First of a two-part series The online world is now packed with applications, so it’s unsurprising that they’re a top target for threat actors. However, traditional application security (AppSec) strategies often prove ineffective. To defend themselves against the rapidly evolving threat landscape, organizations need to build a modern AppSec strategy that addresses these fast-changing conditions.

Device Authority and Entrust Demonstrate Their Partnership Potential to Provide Security to the Supply Chain

Identified as leaders in IoT (Internet of Things) Device Identity Lifecycle Management by ABI Research, and leaders in IoT IAM according to Quadrant, Device Authority and Entrust have worked together to integrate Device Authority’s KeyScaler® IoT IAM (Identity and Access Management) platform with PKI (Public Key Infrastructure) services from Entrust, extending the existing collaboration for Hardware Security Module (HSM) services, to provide device trust, data trust and automation at IoT sca