Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

The Ultimate Security Checklist to Launch a Mobile App in Nigeria - iOS & Android

Nigerian authorities have made great strides in data security, and businesses worldwide are taking notice. If you're planning to launch a mobile app in Nigeria, it's crucial that you understand the importance of app security and take steps to ensure that your app meets Nigerian data privacy requirements. We’re aware that data protection can be overwhelming as it requires a holistic approach that incorporates legal, administrative, and technical safeguards.

Getting Started with Identity Governance and Administration

Identity governance and administration (IGA) helps organizations give each person the right access to the right IT resources, at the right time and for the right reasons. Let’s take a look at 6 core best practices for successfully implementing IGA, as well as some tips for choosing the right tool.

Top 10 Cybersecurity Predictions for 2023

Although 2022 has been a quite tumultuous year for cyber security industry, 2023 is expected to be even more challenging for security teams, experts warn. Here’s Top 10 of key cybersecurity predictions for the 2023 threat landscape from information security leaders that organizations should be aware of and be prepared for.

HIPAA Compliant Mobile App Development: Features, Risks and Checklists

The wide penetration of internet facilities has its imprint on almost all sectors, including the healthcare industry. With most people using smartphones, the demand for online applications is tremendously increasing. As a result, people are shifting towards tele-medication and treatment. However, every successful product has its drawback. Likewise, the popularity of healthcare applications has also captivated more security threats.

UK's automated self-check-outs using Age Verification API

Self-checkout kiosks are automated devices that enable consumers to scan and pay for their products without the help of a cashier. By this point, we’ve all encountered them. They are frequently seen at supermarkets, department shops, and other retail locations where it is possible to skip tedious manual check-out.

Teaching an Old State Analyzer Some New Tricks

Tripwire’s Energy and NERC Compliance Working Group virtual event offered some enlightening information, not only from industry experts but also some candid thoughts from current Tripwire customers. Even the most cogent summary of the keynote, as well as two of the sessions, simply cannot do proper justice to the knowledge that was shared during the event.

6 Reasons You Need to Run SCA Scans on Projects in VS Code

We love open-source software (OSS). Not only does it save time and effort, but it’s also incredibly rewarding to collaborate with other developers on major projects. Plus, it opens the door for innovation that otherwise wouldn’t be possible at this scale. However, with code comes responsibility, and so it’s imperative to understand the risk OSS libraries carry when we’re integrating them into projects.

6 Common Phishing Attacks and How to Protect Against Them

Going into 2023, phishing is still as large a concern as ever. “If it ain’t broke, don’t fix it,” seems to hold in this tried-and-true attack method. The 2022 Verizon Data Breach Investigations Report states that 75% of last year’s social engineering attacks in North America involved phishing, over 33 million accounts were phished last year alone, and phishing accounted for 41% of social engineering compromise overall.

Forrester Research: Show, Don't Tell, Your Developers How To Write Secure Code

If you’re a CISO, VP of Security, or a Staff Security Engineer and still wondering whether your developers own the keys to application security, this Forrester report is for you. Get your complimentary copy now, courtesy of GitGuardian.

Container security best practices: Your guide to securing containers

Over the last few years, there has been a huge adoption of containers. Actually, container technologies have existed for a while, but in 2013, the launch of Docker gave popularity to containers. Docker shows organisations how they can go for container-first development and operations mode. But along with the increase in the use of containers or growth of containers, the risks associated with them also increased.