Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

What's New With Lookout: Simplifying SSE

Organizations continue to endure the challenges that come along with the rapid migration to the cloud, like securing and managing data that is now spread across multiple networks, clouds, and apps. Outdated technologies have led to disjointed, hard-to-manage solutions that struggle to keep up with evolving security threats. But fear not! Lookout is here to help.

My Hacker Story: A Cautionary Tale of Intern Antics and Cultural Learnings

My hacker story does not paint me in the best light, and it is not intended to. I am a firm believer in sharing one's mistakes and being open to learning from them. My incident taught me so much, and many years later, I am still benefiting from the learning opportunities. As the wise quote goes, "We have met the enemy, and they are us" — a sentiment that perfectly sums up my experience.

Materiality Analysis Offers Risk Managers Data-Driven Loss Thresholds

‍Determining and disclosing impactful events has been a longstanding practice for organizations operating within the US market. As early as 1933, with the Securities Act, publicly traded businesses were required to disclose “material information” regarding their security environment, allowing shareholders to make more informed investment decisions.

Web Scraping Best Practices: Good Etiquette and Some Tricks

In this post, we’ll discuss the web scraping best practices, and since I believe many of you are thinking about it, I’ll address the elephant in the room right away. Is it legal? Most likely yes. Scraping sites is generally legal, but within certain reasonable grounds (just keep reading). Also depends on your geographical location, and since I’m not a genie, I don’t know where you’re at, so I can’t say for sure.

Cyber Security Report Examples (3 Common Styles)

Cyber security reports are an invaluable tool for keeping stakeholders and senior management informed about your cyber security efforts. This post outlines examples of some of the most popular reporting styles, with a particular focus on a field of cybersecurity drawing increasing interest among executive teams - Vendor Risk Management. Each of the cyber security report examples in this list have been pulled from the UpGuard platform.

Configuring Maximum Security Log Size

Setting the maximum log size for event logs is crucial for your security policy. Proper configuration helps detect attacks and investigate their sources. Insufficient storage can result in information loss and undetected breaches. This article covers everything you need to know about configuring maximum security log size. Server hardening can be labor-intensive and costly, often causing production issues.

Top 10 Online Resources for Parents to Educate Themselves About Internet Safety

In today's digital age, ensuring internet safety for children is more critical than ever. The online world offers a vast landscape of opportunities and information, but it also exposes kids to harmful online content that parents need to guard against. Here, we aim to equip parents with the best online resources to educate themselves about internet safety. We'll explore a variety of tools, guides, and courses that provide essential knowledge and strategies to keep your children safe online.

How to Use Facial Recognition for Face Search

The lives of modern people are becoming increasingly comfortable and productive, all thanks to the rapid advancement of innovative technologies. Nowadays, to communicate with acquaintances, make purchases, and pay for services, all you need to do is connect your device to the internet. Have you lost contact with an old acquaintance? This is easily remedied by Face search person by photo. The principle of search work is as simple as possible. To get the necessary information you should simply upload a photo to the search engine.

Navigating the Hybrid Workplace: Balancing Productivity, Efficiency and Security

In today's digital workplace, we rely heavily on a wealth of collaboration solutions; in fact, these tools have become ingrained and part of our daily workflows. Despite hybrid working patterns and the return, for some, to a more traditional work environment, the continued reliance on collaboration apps remains strong. This presents opportunities and challenges for the IT teams tasked with onboarding and offboarding employees and effectively managing an ever-growing plethora of tools and apps.

What Are the Benefits of FedRAMP Certification in 2024?

FedRAMP, the federal risk and authorization management program, is a comprehensive and structured way to develop a security – mostly cybersecurity – position when working with the federal government. It’s a framework meant for contractors and third-party businesses that handle information for the government and who need to keep it secure. The question is, if you’re a cloud service provider, what are the benefits of implementing FedRAMP?