Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Security Orchestration Use Case: Curtailing Phishing Attacks

Phishing is the bad act of luring users to visit the malicious websites that apparently seems legitimate. The purpose of phishing is to trick users into revealing sensitive and personal information such as usernames, passwords, credit card numbers, and so forth. More often, threat actors carry out phishing attacks by sending suspicious links or attachments through Emails and social media websites.

Office 365 Email Security - The Hidden Costs

You’ve made the big decision to migrate to Microsoft Office 365. Its array of cloud collaboration makes this a great decision. Yet at the same time, Microsoft is also pitching Office 365 as a way to consolidate your security, compliance, and e-discovery platforms. It is promising advanced threat protection, data protection, and an online archive that’s all about privacy and meeting robust data-retention requirements. And it’s all included. How can you turn down that offer?

From Paper to Protected With Optical Character Recognition

For many organizations, the transition to paperless systems is fraught with operational challenges. The difficulty is not so much with the deployment and adoption of digital tools, but rather with converting piles of paper into usable data. The first step in this process is high-volume document scanning; turning the physical stuff digital. Next, it’s time to make sense of the image captures.

Our Recap of AWS re:Invent 2018

Who else had as much fun as we did at re:Invent 2018? I hope everyone is now home, rested, and going through everything they’ve learned while at the show – I know I learned a ton! The best part of being at a conference like re:Invent is hearing firsthand from practitioners how they are using technology to solve their business challenges.

A security overview of Content Management Systems

Any developer would probably agree Content Management Systems (CMS) make it easier for web development teams and marketing to work together. However CMS assets like blog.company.com are also web application based and could be targets of hacker attacks. Why’s that? Simply because they are based on commonly used technologies, communicate with end users, bring in organic or paid reader traffic and build brand awareness.

The Ransomware Remedy

As ransomware attacks become more sophisticated, they pose an ever-increasing threat to data-driven systems. Much like an infectious disease, malware wreaks the most havoc once it spreads; so the best way for hackers to get the most bang for their buck is by targeting vulnerable businesses. When an encrypted file from one account syncs to the cloud and to other devices, productivity grinds to a halt.

Devo Technology Accelerates Investment in Cybersecurity with New Business Unit, Major Hires

Cambridge, MA, December 4, 2018 – Devo Technology, the data operations company, is building on its success delivering cybersecurity solutions to Fortune 2000 companies with the addition of three security executives to its employee roster. The company today announced the appointment of Julian Waits as General Manager of the Devo Security Business Unit. Joining Waits are Matt Mosley, Vice President of Products, Cybersecurity and Fred Wilmot, VP of Security Engineering.

What Type of Vulnerabilities Does a Penetration Test Look For?

Penetration testing is becoming increasingly popular as organizations are beginning to embrace the need for stronger cybersecurity. But there are still too many businesses that don’t fully understand the benefits of regular security testing. Pen testing is vital for any kind of organization with an IT system or website. A recent survey of penetration testers revealed that 88 percent of those questioned said they could infiltrate organizations and steal data within 12 hours.