Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How Can I Protect My Outlook Email?

If you're looking for an email service, you can find several options on the internet: from one of the oldest, Hotmail (now known as Outlook), to Gmail, iCloud, Yahoo, and many more. Today, we will explain their features and introduce some more secure alternatives to help you find the best email service. When we create an Outlook account, we have to accept certain terms and a privacy policy. The fine print that nobody reads, in which we agree to give our pesonal data and privacy to Microsoft.

Drata Integration - How to Automate Technical Vulnerability Management

Aikido Security is now live on the Drata Integration marketplace! That’s great news because navigating today’s cybersecurity regulatory landscape is a bit like walking a tightrope in a hurricane. As cyber threats evolve, so do the regulations designed to keep them in check. Businesses now find themselves grappling with a growing list of compliance requirements, each more stringent than the last.

Brazilian Entities Increasingly Targeted by Nation-State Phishing Attacks

Mandiant has published a report looking at cyber threats targeting Brazil, finding that more than 85% of government-backed phishing activity comes from threat actors based in China, North Korea and Russia. “The Brazil-focused targeting of these groups mirrors the broader priorities and industry targeting trends we see elsewhere,” the researchers write.

Cloud HSM vs On-Premises HSMs: Choosing the Right Encryption Solution

Data security is one of the most important issues in the modern world, and companies must ensure that all their important information is kept out of cyber criminals’ reach. As technology evolves and more data becomes increasingly vulnerable to cyber-attacks and illegal access, security remains critical for organizations that want to protect their sensitive information.

Stop Letting Security Audits Go to Waste-They're More Than Just a Checkbox Exercise

Over the past two decades, data has become a critical asset for nearly every organisation. Consequently, a variety of regulations and industry standards now govern business operations. In today’s data-driven age, certification through security audits serves as a testament to an organisation’s adherence to industry standards, regulations, and security measures.

What is Glupteba and how can you protect your customers from this malware?

Over time, cybercriminals find ways to exploit new cybersecurity breaches, leading to the creation of malware that compromises users' security. Every year, one or more malware variants stand out as new, evasive, or dangerous. According to our Internet Security Report (ISR), last year it was Glupteba.

7 Top Mobile Security Threats: Safeguard Your Device

Mobile devices have made it possible for employees to work and communicate from just about anywhere. But that convenience comes at a price. The rise of mobile devices and the rise of mobile security threats have gone hand-in-hand. Mobile devices like phones, tablets, and ChromeOS devices present an incredible vector for phishing, social engineering, and malware distribution—and threat actors are keenly aware of that fact.

Financial Highwire: The Critical Role of Identity Security in Finance

In the highwire act of the financial services sector, identity security serves as the essential safety net, meticulously engineered to intercept any missteps before they precipitate a fall. Just as a tightrope walker relies on a safety net for confidence at dizzying heights, financial institutions – from global companies and insurers to community banks and credit unions – navigate a complex array of risks.

Storage Born in the Cloud

Storage Born in the Cloud Current estimates show that humans are generating more than 325 million terabytes of data – every single day. That’s an enormous amount of information, and organizations are struggling to manage it. As organizations grow, the data they are managing across business solutions, applications, and end users will continue to increase radically. This data is usually unstructured, often containing multiple different formats and media.

NIS2 is Coming - How Should You Handle the New Incident Reporting Obligations?

October is rapidly approaching, and that means new cybersecurity regulations known as NIS2 are set to be enacted by European Union (EU) member states. States are required to publish their local version of the NIS2 Directive into law by the 17th of October. Whilst many countries are well on track, however, some have already acknowledged they will not meet the deadline. This delay leaves organisations somewhat in the dark as to what they will need to comply with and by when.