Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Office 365 Ransomware Protection

Most organizations today rely on Entra ID (formerly Azure AD) and Microsoft 365 (formerly Office 365) for core business operations. But how secure are these vital platforms against ransomware? This article explores the key concern concerns in Entra ID and Microsoft 365 and details the key security controls they offer to block, detect and recover from ransomware. Then it offers a robust solution that can further safeguard your data and IT systems.

How to Create Active Directory Query-Based Groups

Using Active Directory (AD) security groups and distribution groups is a best practice for simplifying IT administration, enhancing security and enabling effective communication. However, in many organizations, the membership of these groups is defined by an explicit list of specific users, computers and other entities.

Making Sense of AI in Cybersecurity

Unless you have been living under a rock, you have seen, heard, and interacted with Generative AI in the workplace. To boot, nearly every company is saying something to the effect of “our AI platform can help achieve better results, faster,” making it very confusing to know who is for real and who is simply riding the massive tidal wave that is Generative AI.

Leveraging Strategic Threat Intelligence for Enhanced Security in the Financial Services Industry

The financial services industry stands as one of the primary targets for threat actors seeking to exploit vulnerabilities and perpetrate malicious activities. The criticality of safeguarding both an organization’s infrastructure and its clientele cannot be overstated. Amidst these challenges, the role of a comprehensive threat intelligence platform emerges as a beacon of proactive defense.

Researchers Demo New CI/CD Attack in PyTorch Supply-Chain that Exploiting GitHub Self-Hosted Action Runner

The new guidelines to secure GitHub repositories are being followed by every enterprise. These new protocols were circulated after discovering a vulnerable loophole in the self-hosted action runner in August 2023. To know more about the vulnerability, how and who discovered it, and its mitigation, read further.

What is an Application Security Tool? Top 5 App Security Tools

Applications are becoming the gateway for attackers to gain unauthorized access and perform their malicious activities on end-user devices. And when such a thing happens, not only the user but also the software development firm suffers. So, now it has become utterly important to ensure the app security with the best-in-class tools available.

Understanding SASE and SSE | What's the difference?

In the rapidly evolving realm of network security, staying abreast of the latest technologies is crucial to safeguarding your organization’s data and infrastructure. Two prominent solutions that have garnered attention in recent times are Secure Access Service Edge (SASE) and Secure Service Edge (SSE). In this blog post, we’ll delve into the nuances of these two concepts, helping you make informed decisions about your network security strategy.

Cultivating a Cybersecurity Culture

When I attend a networking event and ask a business owner, “Who’s responsible for Information Security?” The usual reply is “IT”. But in today’s hyper-connected world, where digital landscapes are constantly evolving, and data breaches and cyberattacks are becoming alarmingly common, organizations must recognise that information security is not solely the responsibility of the IT department.