Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Top Third-Party Risk Cyber Gaps in 2022

It's easy for cybersecurity teams to think they're doing everything to stay ahead of data breaches and cyberattacks in this post-pandemic era. For instance, you've probably rallied qualified experts to augment your IT ecosystem and supplied them with state-of-the-art threat detection and mitigation technologies that offer real-time insight into your infrastructure security.

See No Evil, Hear No Evil: The Use of Deepfakes in Social Engineering Attacks

Artificial Intelligence (AI) is one of the most high-profile technology developments in recent history. It would appear that there is no end to what AI can do. Fom driverless cars, dictation tools, translator apps, predictive analytics and application tracking, as well as retail tools such as smart shelves and carts to apps that help people with disabilities, AI can be a powerful component of wonderful tech products and services.

ISO27001:2021 - A New Way of Working

It has been a long time coming! The upgrade to the international standard for information security management systems, ISO27001:2013, is here (almost). Hallelujah! If you’re reading this article, then there’s a reasonable assumption that you know what ISO27001 is and you’re not going to be too worried about the back story. But let’s all be clear on a couple of points. The current version of the Information Security Management Standard is ISO27001:2013.

Identifying exploits and adversary tradecraft of FORMBOOK information-stealing campaign

We wanted to call out some great adjacent research from the team at Sophoslabs Uncut that was released on December 21, 2021. Research groups frequently analyze similar (or in this case, identical) campaigns through their own unique lens. This is fantastic for the security community, as the campaign gets more eyes and different perspectives applied towards the same problem.

How Your Security Team Can Reinforce Data Privacy Best Practices During #DataPrivacyWeek

In 2008, Data Privacy Day started as an extension of Europe’s Data Protection Day, which commemorates the signing of Convention 108. This year, the National Cybersecurity Alliance (NCA) established Data Privacy Week to empower individuals and businesses to respect privacy, safeguard data and enable trust. Plus, data privacy is so important that it needs more than just a single day of discussion!

How Machine Learning has become essential in stopping spam and bots

Spam filters are essential. Without them we couldn’t cut through the noise of phishing scams and malware links to read our messages. Hatred of spam is well entrenched in society, just as bots (especially scalpers) have become the bane of so many lives in recent years. There are several parallels between the email spam in our inboxes and malicious bots that crawl the web. Both are designed to cause harm to businesses and individuals. Both exploit systems designed to be useful.

Scale and mature your AppSec program with a managed services partner

A managed services partner should do more than run the tests you choose. The right partner will work with you to shape your application security program. If your firm has attempted to hire internal security experts lately, you know they’re few and far between.