Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

The difference between SASE and Zero Trust

Customers often ask me: What is the difference between Zero Trust and SASE? My answer is almost always the same: Nothing….and, everything. Both have taken the industry by storm over the last couple of years, and even more so with the security and access demands on the business driven by the existing remote workforce, but both have different implementation approaches. It is important to understand, however, that one does not fully provide the other; in fact, they reinforce each other.

What is a cybersecurity strategy and how can your business develop one?

The number of users, devices, and resources on company networks is growing exponentially. With this expanding attack surface, a company’s assets, intellectual property, reputation, staff and customer data are all at risk. It’s no wonder cybersecurity has increased in prominence, with many organizations investing in more sophisticated technical solutions. But just because you have all the network security solutions in place, it would be unwise to get complacent about your security posture.

Understanding IT Security

With cyber criminals operating around the world, it’s more important than ever that businesses start understanding IT security. Afterall, 86% of UK organisations expect cyber attacks to increase, and 33% of hacked companies admit to losing customers after a breach. As an individual, a business, or a government or a nation-state, IT security is something that should be taken seriously.

Everything you need to know about vulnerability scanning

With high-risk vulnerabilities popping up every other week, realising there is no such dream ‘patch everything’ and configuration changes slowly add up to weakening your infrastructure security. Vulnerability management and scanning are core components of a solid cyber security strategy, ensuring a sound risk management process. Vulnerability management helps an organisation keep an eye on their assets, both from asset management and operational security.

Modern application security requires speed, scale, and collaboration

Detectify is on a mission to make the Internet safer through automation and crowdsourced hacker knowledge. We recently published “A guide to modern web application security” for SaaS and tech organizations looking to bring their security up to speed with development. Download your free copy of the guide here. Organizations are shipping code daily, making it challenging for security teams to keep track of changes in the web application and keep up with new security threats.

Securing cloud native applications: ActiveCampaign's VP, Information Security provides perspective

Cloud native has been a growing trend as organizations shift away from on-premise infrastructure and longer software release cycles towards a more iterative development approach using cloud-based tooling and infrastructure. While cloud native applications enable rapid deployments and greater scalability, this emerging software approach also introduces security challenges.

Weekly Cyber Security News 09/04/2021

A selection of this week’s more interesting vulnerability disclosures and cyber security news. For a daily selection see our twitter feed at #ionCube24. I think we are all aware of phishing email, and how they apply urgency and alarm to entice you to click on something you shouldn’t. Well, Deliveroo in France thought it would be a great April Fool’s wheeze produce fake receipts for their customers. Didn’t go down well….

Is Your Business Ready For Life After Covid?

As we all prepare for a new life after Covid-19, more businesses than ever are looking at expanding their digital presence and making online their number one channel. Despite this, many are unaware and ill-prepared for the threats facing them as we all transition to a “new normal”. Thanks to the rollout of vaccines, the threat of Covid-19 is steadily diminishing and businesses are set to resume normal service.

Penetration testing: A yearly physical for your applications

Every spring, my family has an annual ritual of visiting our friendly primary care physician for our physical exams. Although it’s one of the last things my wife wants to do, these routine checkups are an important way to detect problems before they become more noticeable.

Malware Campaign Impersonating Large Retailers, Targeting Social Media Influencers

Over the last few weeks, Cyberint has witnessed an ongoing attack campaign targeting social media influencers, attempting to infect them with malware by impersonating large clothing retailers. The campaign targets influencers across multiple social media platforms but currently appears to mostly focus on influencers operating on YouTube. Further, although the infection process is not sophisticated, it is notable and appears to be evolving.