Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Five worthy reads: Differential privacy-what it means for businesses

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we explore one of the evolving privacy-enhancing techniques called differential privacy and how it’s being leveraged by organizations to safeguard sensitive data from being exposed. Cutting-edge technologies based on artificial intelligence and machine learning have been gaining traction in recent years.

Data protection and the Age-Appropriate Design Code

A 2019 report by Ofcom shows that 50% of ten-year olds own mobile phones. While viewing of video-on-demand (with YouTube as firm favourite), has doubled in the last five years among children. Platforms like TikTok are rapidly growing in popularity. Sadly, more and more children are being exposed to hateful, violent and disturbing contents on these platforms.

Impact of modern ransomware on manufacturing networks

Manufacturing facilities employ assembly lines, material handling systems, motors, and furnaces that all require big physical machines. Innovative trends in the manufacturing industry and the advancement of operational technology have also meant introducing computers across operation and production systems.

What Makes Teleport a Great Place to Work

August has been a great month for Teleport. Our Series B round of funding , led by Kleiner Perkins, plus the arrival of secure MongoDB access with Teleport 7.0 is cause enough for celebration. In addition, Teleport has been officially Certified™ by Great Place to Work ®. This prestigious certification is based entirely on feedback from current employees; this year, an incredible 100% of our team members told us we are a great place to work.

What is ISO/IEC 27001? A Clear and Concise Explanation for 2021

ISO/IEC 27001 is the leading international standard for regulating data security through a code of practice for information security management. Its creation was a joint effort of two prominent international standard bodies - the International Organization for Standardization (ISO), and the International Electrotechnical Commission (IEC). This is why the standard is formally prepended with ISO/IEC, though "IEC" is commonly left to simplify referencing.

Key insights from the Conti ransomware playbook leak: establishing a foothold

Following a leak of a cache of documents relating to the Conti ransomware group by one of its own affiliates, in the first of a two-part blog series we analyse some of the main findings and outline steps to mitigate against Conti and other ransomware variants.

What is a Third-Party Risk Assessment?

A third-party risk assessment is an analysis of the risk introduced to your organization via third-party relationships along the supply chain. Those third parties can include vendors, service providers, software providers and other suppliers. Risks to be considered include security, business continuity, privacy, and reputation harm; as well as the risk that regulatory compliance obligations might force you to stop working with a party until its issues are addressed.

A Year of Supply Chain Attacks: How to Protect Your SDLC

One of the most worrisome trends in cybersecurity today is the skyrocketing incidence of supply chain attacks, such as the ones that hit SolarWinds last year and Kaseya more recently. Because they focus on compromising software development and delivery, supply chain attacks have forced developers and DevOps teams to scramble for solutions. Unfortunately, supply chain attacks are particularly challenging to prevent, detect and remediate, and, because of their stealthy nature, are often devastating.