Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Best practices for implementing the 5 most challenging technologies in cybersecurity

Technology plays a fundamental role in the transformation process that companies have embraced in recent years. However, tech decision-makers have some reservations about adopting the latest technologies to avoid putting corporate security at risk. These are the findings of the Pulse survey of 150 technology leaders, in which 65% say they will avoid implementing AI, Hybrid Cloud, Edge Computing, 5G and Container Security because of the complexity required to implement them securely.

ICS Security in Healthcare: Why Software Vulnerabilities Pose a Threat to Patient Safety

The lack of healthcare cybersecurity is one of the most significant threats to the sanctity of the global healthcare industry. This is made evident by the fact that in 2020 more than 18 million patient records were affected by successful cyber-attacks on the U.S. healthcare system. Health professionals should not take this issue lightly, as financial assets and intellectual property are at risk.

Ransomware: 2023's top attacks and need-to-know stats

As we navigate through 2023, ransomware attacks continue to grow in scale and sophistication. This year has already witnessed an alarming number of high-profile incidents (at the time of writing), meaning ransomware attacks remain one of the most significant cybersecurity threats organizations face.

Protecting Against Bad Chemistry (with Cybersecurity)

Do you recall one of the first really fun chemistry experiment you performed as a child? If your school followed the usual curriculum, then you probably made a model volcano and then added some baking soda to the opening, followed by the addition of vinegar. A variation of this experiment was to add the ingredients to a plastic bottle, then stretch a balloon over the mouth of the bottle to watch the balloon inflate with carbon dioxide gas.

How Hardening is reflected in the different NIST Standards

NIST stands for National Institute of Standards and Technology. NIST was founded in 1901 and is a part of the U.S Department of Commerce. It is one of the oldest physical science laboratories in the US and was formed to remove challenges related to industrial competitiveness.

NIST Cyber Security Framework - 5 Core Functions Infographic

Some standards, guidelines, and best practices to meet the industrial, public, and federal agencies’ needs in Cybersecurity are developed by NIST. The cybersecurity framework by NIST has an outcome-based approach and this set it to be applied in any sector and on any size of business. There are three basic pillars of the NIST cybersecurity framework, namely; The framework core has five major functions.

How to Decrypt Ransomware (with 100% Free Tools)

‍Ransomware attacks are dominating news headlines, with ransomware-as-a-service (RaaS) operators actively seeking to exploit network vulnerabilities and infect unsuspecting victims. The healthcare sector and financial industry are especially vulnerable to ransomware attacks, as they store valuable personally identifiable data (PII) which can be misused to carry out lucrative crimes, like identity theft and fraud.

The role of the DPO just got bigger and more powerful

Traditionally, we find the DPO (Data Protection Officer) in large and very large enterprises. Small and Medium-sized businesses most probably do not have a DPO. But that is going to change now. Why? After nearly two years of deliberations, the Joint Parliamentary Committee (JPC) finally chaired the Personal Data Protection (PDP) bill, 2019 in the Indian Parliament. This bill will ultimately pave way for the strongest data protection law in the world’s largest democracy.