Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Mastering success: 5 key stages of professional services delivery

In this blog post, Kelsey Sevening, Sr. Manager, Project Management at Tines shares what customers can expect when engaging with our professional services team to help them reach their goals faster. When it comes to investing in professional services, the quality of the experience can vary widely. While some customers might have exceptional experiences and others less so, most find themselves somewhere in the middle.

The 7 Best Tools for Sharing Passwords Online 2024

The first rule of sharing your passwords online club is, you must not share your passwords online. Unfortunately, this is not always possible, as teams and departments need ways to access different platforms, websites, or accounts to run smoothly. If you or your team find yourselves in a situation where sharing passwords online can’t be avoided, there are security measures you can take to prevent your password from falling into the wrong hands.

Re-Extortion: How Ransomware Gangs Re-Victimize Victims

Ransomware has evolved significantly since its inception. Initially, these attacks were relatively simple: malware would encrypt a victim's files, and the attacker would demand a ransom for the decryption key. However, as cybersecurity measures improved, so did ransomware gangs' tactics. Modern ransomware attacks often involve sophisticated techniques such as data exfiltration, where attackers steal sensitive information before encrypting it.

5 Genuine Reasons - Why Mergers & Acquisitions Need Virtual Data Rooms

Virtual data rooms (VDRs) are revolutionizing merger and acquisition operations. They enable all parties involved - buyers, sellers, and intermediaries - to access, exchange, and analyze large amounts of information quickly and efficiently. This not only speeds up the transaction process but also increases its overall value. All transaction participants have access to a secure place to request, share, organize, and store thousands of confidential documents when using a virtual M&A data room.

Safeguarding Sensitive Data in the Age of AI: Tips for Using ChatGPT and Similar Generative AI Tools

Learn key strategies for protecting sensitive data when using ChatGPT and other generative AI tools. Discover best practices for compliance, access control, and system updates to ensure data security.

Outpost24 Launches AI Domain Discovery in External Attack Surface Management

Outpost24 is pleased to announce the integration of a new Artificial Intelligence (AI) assistant into its Exposure Management Platform. This groundbreaking AI Domain Discovery feature enables Outpost24 customers to effortlessly identify domains belonging to their organization, significantly improving the speed and accuracy of domain ownership and classification.

Dark web monitoring as your early warning system for insider threats

According to the 2023 Insider Threat Report by Cybersecurity Insiders, 74% of organizations are at least moderately vulnerable to insider threats. This statistic underscores a critical issue: Insider threats are notoriously difficult to detect because they originate from individuals with authorized access and intimate knowledge of your systems. While traditional security measures focus on external threats, they often fall short when it comes to spotting insider threats.

Over 1 Million websites are at risk of sensitive information leakage - XSS is dead. Long live XSS

Cross-site scripting (aka XSS) has rightfully claimed its place as one of the most popular web vulnerabilities. Since its first emergence, somewhere in the dark days of the internet, countless vulnerabilities have been found across websites everywhere. Therefore, it comes as no surprise that XSS has been consistently highlighted as a top risk in the OWASP TOP-10 since the list's very first iteration in 2004!

7 Important Theft Protection Features for a Cryptocurrency Wallet

While you don’t always need a cryptocurrency wallet to trade blockchain assets, using a good wallet to facilitate exchanges is a matter of common sense. Wallets don’t just provide a convenient way to manage your crypto funds, but they also help keep your tokens safe from the malicious parties that are all too commonplace in the world of blockchain currencies.