Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Cloud Computing Security Tools: Choosing the Right Solutions

No matter where you host your data, there are always risks. The public cloud is no exception. While providers like Amazon, Microsoft and Google offer security features, ultimately, cloud security is your responsibility. Where do you start? This article explains the key elements of a strong security posture in the cloud and how to choose the right security software solutions for your organization.

The perfect storm: How digital transformation is reshaping security and networking

Think back to the end of 2019. Enterprises were evolving IT infrastructure at a moderate pace to reduce costs, be more competitive, and improve their ability to adapt to an increasingly digitized world. Whether migrating workloads to the cloud, virtualizing network functions, diversifying mobility, or moving applications and services closer to the edge, digital transformation was steadily evolving the business landscape.

Detectify security updates for November 30

Our Crowdsource ethical hacker community has been busy sending us security updates, including 0-day research. For Asset Monitoring, we now push out tests more frequently at record speed within 25 minutes from hacker to scanner. Due to confidentially agreements, we cannot publicize all security update releases here but they are immediately added to our scanner and available to all users. The following are some of the security vulnerabilities reported by Detectify Crowdsource ethical hackers.

Insider Threats: Risk Assessment Considerations for Remote Work

The outbreak of COVID-19 has led many businesses to transition a large number of employees to remote work. The shift could end up becoming a long-term trend; it’s expected to continue after the pandemic ends. Therefore, it is more important than ever to develop strategies for managing and responding to risks within your organization. Internal risk management procedures will need to adapt to the issue of insider threats, a challenge which is compounded by remote work.

How Understanding User Privacy Can Improve Your Cybersecurity

User privacy and cybersecurity are two terms that often get used interchangeably when we talk about protecting our information on the internet. However, privacy and security are different areas of practice – only recently have these two areas come to intersect. In 2018, Harvard Business Review reported, “[P]rivacy and security are converging, thanks to the rise of big data and machine learning.

Configure security tools for effective DevSecOps

Managing security vulnerabilities and false positives is a challenge in today’s DevSecOps environment. Configure the right tools correctly to avoid overload. To do a job well, you need the right tools. But it’s just as important—perhaps even more so—to use those tools correctly. A hammer will make things worse in your construction project if you’re trying to use it as a screwdriver or a drill. The same is true in software development.

Hacking Christmas Gifts: Putting IoT Under the Microscope

If high-tech gadgets are on your holiday shopping list, it is worth taking a moment to think about the particular risks they may bring. Under the wrong circumstances, even an innocuous gift may introduce unexpected vulnerabilities. In this blog series, VERT will be looking at some of the Internet’s best-selling holiday gifts with an eye toward their possible security implications.

How to Prioritise Cybersecurity Budgets in 2022

As we approach the new year, many organisations will be working out how to prioritize cybersecurity budgets in 2022. However, with the threat landscape evolving so quickly, what may have offered sufficient protection last year, might no longer be viable. This means security leaders will need to complete an evaluation of their organisation’s security posture.

Weekly Cyber Security News 27/11/2020

A selection of this week’s more interesting vulnerability disclosures and cyber security news. For a daily selection see our twitter feed at #ionCube24. Social engineering attacks are really common, perhaps due to customer service staff being constantly told to present a helpful persona, especially in these tough times where customer retention is important. Vigilance and process are your best friends here.

What Is Configuration Management and Why Is It Important?

Configuration management (CM) is a systems engineering process for establishing and maintaining consistency of a product's performance, functional, and physical attributes with its requirements, design, and operational information throughout its life. Configuration management is a form of IT service management (ITSM) as defined by ITIL that ensures the configuration of system resources, computer systems, servers and other assets are known, good and trusted. It's sometimes referred to as IT automation.