Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

8 Steps for a Successful DevOps Transition

Organizations stand to gain a lot from transitioning to a DevOps software development model. Switching to DevOps leads to quicker problem solving, increased employee engagement, and more time for innovation. That’s assuming a transition is successful, however. Enterprises can run into various problems along the way, including inadequately measured risk, which could spell trouble down the road. Fortunately, none of these problems are inevitable if you approach the DevOps transition methodically.

2 Strategies to Tighten Your Cloud Security

Creating a thorough and effective security program is difficult enough when your data is stored on-premises. But most organizations and agencies straddle hybridized on-prem and cloud environments—or they’re cloud-native entirely. This complicates the role of cybersecurity teams who now need tools that can traverse multiple environments without missing a beat.

Cybersecurity: Protecting All the Endpoints

Network security is an issue that is increasingly important as businesses and even households shift more workflow processes and key tasks to the network and into the cloud. While some users may find it a challenge to protect even a single digital device, keeping an entire network secure can be a tall order for even the most tech-savvy users.

Electronics Retailer Confirms Breach Attempt of 5.9M Payment Cards

A consumer electronics retailer has confirmed a data breach attempt to compromise the details of 5.9 million payment cards. On 13 June, Dixons Carphone released a notice disclosing its investigation into an instance of unauthorized data access. The company came across the suspicious activity while reviewing its systems and data. Subsequently, it contacted security experts to help determine what happened.

What Is Integrity Management?

If you’ve been in information security for a while, you’ve likely had some experience with file integrity monitoring (FIM). It’s a capability with a long history, going back to the original open-source Tripwire tool for monitoring file hashes. And FIM has staying power. It’s still around, and there are still new deployments. There aren’t a lot of security controls that continue to be valuable over such a long time frame.

An introduction to penetration testing

The digital world has become a dangerous place. It’s like the Wild West (the movie kind, not the real kind, which was decidedly less wild than it’s portrayed), with outlaws out to do you harm and make off with your precious data. Fortunately, like any good western, there are also honour-bound gun slingers seeking to bring law, order and – most importantly – security to the digital landscape.

Tune your SIEM to be GDPR Compliant - 5 Steps to Take

The most hyped law on data protection has finally come into effect on May 25, 2018. Passed by the European Parliament on April 14, 2016, it is already being touted as the most stringent data protection law across the world. Prior to GDPR, Data Protection Directive of 1995 was applicable which now stands repealed. Apart from the businesses incorporated in the European Union, GDPR also applies to businesses incorporate outside the European Union but are dealing with the data of EU residents.