Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Email Bombing: Why You Need to be Concerned

Over the last few months, the topic of email bombing has been brought to our attention multiple times, mostly queries from customers that go something like this: “I have a few users experiencing some sort of spam attack, where they are receiving thousands of random registration or subscription emails. What do I do, and why is it occurring? Help!” This scenario is known as email or subscription bombing.

23 NYCRR Part 500 Amendment Compliance Checklist

Banks and Insurance companies in New York are grappling with the complexities of 23 NYCRR Part 500, a challenging cybersecurity regulation that demands comprehensive and nuanced security measures. The primary hurdle for these organizations is translating the regulatory language into actionable, practical steps that meaningfully enhance their cybersecurity posture.

Cybersecurity Consultants: How They Safeguard Your Business Operations

In the digital world of today, there are more and more cyber risks that can hurt their operations, customers' trust, and bottom line. Cyberattacks are changing quickly. Ransomware, hacking, and data breaches are just a few examples of how they hurt businesses financially and publicly. Recent studies show that hacking will cost the world an estimated $10.5 trillion every year by 2025. This shows how important it is to have strong security measures right away.

How to Prevent Hacking During the Holiday Season

The holidays are a busy time for cyber attackers. They rely on distracted workers and lax security systems to breach an organization’s defenses. Then, they deploy ransomware or perform smash-and-grab operations on as much information as they can get their hands on. Either way, the goal is the same: profiting from a brief moment of weakness in your cybersecurity defenses. If you’re wondering how to prevent hacking during this hectic time of year, Lookout is here to help.

NIS2 Penetration Testing and Compliance

Every day, we hear about security threats and attacks on organisations. These threats can range from ransomware and data breaches to leakage of sensitive data. There is no denying that cyber threats have been on the rise, and many organisations have fallen victim to these attacks, leading to financial and reputational losses. Hence, it is crucial to implement policies and processes that can help respond to these attacks.

Understanding NIS2: Essential and Important Entities

NIS 2 aims to enhance the security of networks and information systems in the EU. Its main goal is to level up the cybersecurity game across Europe. It requires organisations in critical sectors to take cybersecurity seriously. The transposition of the NIS2 Directive into national law by member states emphasizes the deadline for compliance and the implications for cybersecurity regulations within each country’s legal framework.

4 tips for securing GenAI-assisted development

Gartner predicts that generative AI (GenAI) will become a critical workforce partner for 90% of companies by next year. In application development specifically, we see developers turning to code assistants like Github Copilot and Google Gemini Code Assist to help them build software at an unprecedented speed. But while GenAI can power new levels of productivity and speed, it also introduces new threats and challenges for application security teams.

Enhancing Cybersecurity: Essential Inbound Email Security Strategies for Modern Businesses

As cyber threats continue to evolve, protecting your organization's email communications has never been more critical. From advanced AI-powered filtering to comprehensive staff training, discover the essential strategies that safeguard your business against modern email-based attacks. This guide provides actionable insights to strengthen your security posture and defend against emerging threats targeting your inbox.