Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

On Sale! Access to your Crown Jewels

Remote Desktop Protocol (RDP) is a communication protocol developed by Microsoft, which provides a user with a graphical interface to connect to another computer over a network connection[1]. Once connected, the remote user will be able to communicate with the machine using their input devices, keyboard and mouse, and to have their screen displaying the output of their actions – as if they were physically connected. Simply put, gaining access to your crown jewels.

An Analysis of Cyber Attack Costs on the Life Sciences Industry

2020 provided a perfect storm for cybercriminals to extort record amounts from vulnerable businesses. Recent reporting has identified life sciences companies as being particularly attractive to target as they have valuable intellectual property information and have enough funding to pay high ransom demands. The pharmaceutical industry is currently at the top of the most targeted industries for such attacks.

The Changing Dynamics of Cyber Insurance

Almost exactly a year ago, cybersecurity professionals were locked in a heated debate about insurance. While some were keen to point out that the future of the industry would need to include some form of insurance market, others argued that cyber insurance would never be worth the premiums, especially given the inherently volatile nature of cybersecurity. The pandemic has changed all of that.

Detectify ethical hacker kept the country code domain .cd safe from potential attacks

NEW RESEARCH – On December 30, Fredrik Nordberg Almroth, security researcher and co-founder of Detectify – the Sweden-born cybersecurity company that offers a web vulnerability service powered by leading ethical hackers – found a vulnerability that left the country code top-level domain of the Democratic Republic of Congo, .cd, open to severe potential abuse.

Security as Code: Why It's Important and What You Need to Know

Software is becoming an increasingly pivotal part of modern business and society. In turn, consumers have come to expect instant gratification. This has driven businesses to concentrate on innovation and speed to market. Businesses that can’t keep up with the hyper-competitive market of speed-to-value are falling behind.

Do's and Don'ts of Using Software For Monitoring Computers

According to the American Management Association, nearly half of employers monitor their employees’ digital activity on company-owned devices to some degree. Some of these employers manually read employees’ emails and track their activity. But the vast majority use software for monitoring computers, which is far more efficient. The right software can help you keep track of what your employees are doing during work hours, regardless of whether they are in the office or working remotely.