Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Colonial Pipeline Hack - What Can We Learn?

It has been reported that the hack that took down the largest fuel pipeline in the United States and led to fuel shortages across the whole of the East Coast was the result of a single compromised password that was leaked on the Dark Web through a data breach. On April 29th 2021, hackers gained access to the network of Colonial Pipeline Co. via a Virtual Private Network (VPN) connection that allowed the hacker remote access to the corporate network.

The Principle of 'Least Privilege' in the World of Cybersecurity

The principle of least privilege in cybersecurity prescribes that no user should have access to system resources beyond what’s necessary for fulfilling a specific task. Adhering to this principle has become essential, as one of the primary ways malicious actors breach a system is by compromising (legitimate) user access.

The Many Challenges of a CISO - The ClubCISO 2021 Information Security Maturity Report

We all have heard and read how the pandemic has disrupted our lives, how it has accelerated digital transformation to an unprecedented extent and how it challenged the existing security policies and practices. The question is how the people responsible for fortifying their organizations experienced the whole situation.

Web application security testing at scale with Coverity SAST

With the rise of cyber attacks on web apps, organizations require AST tools that can help manage web application security and compliance. Remember the saga of Equifax and the unpatched Apache Struts vulnerability? It wasn’t that long ago, and it’s one of the most notorious web application security incidents to date.

EO, EO, It's Off to Work We Go! (Protecting Against the Threat of Ransomware with Splunk)

On June 2nd, 2021, the White House released a memo from Anne Neuberger, Deputy Assistant to the President and Deputy National Security Advisor for Cyber and Emerging Technology. The subject? “What We Urge You To Do To Protect Against The Threat of Ransomware.” It outlines several recommendations on how to protect your organization from ransomware. The memo was a follow-up to President Biden’s May 12th Executive Order on Improving the Nation’s Cybersecurity Order (EO14028).

What Is Cloud Infrastructure?

The term “cloud infrastructure” refers to both the hardware systems and software applications that support a cloud computing environment. This might include cloud storage, virtualization applications, IT management tools, API connectivity, and relevant cloud service providers. In a cloud computing environment, all of the aforementioned IT infrastructure components would be hosted offsite by a service provider and delivered through an internet network.

What Are the Types of Information Security Controls?

When safeguarding your business against cyberattacks and data breaches, CISOs and compliance officers can choose from all sorts of information security controls — everything from firewalls to malware detection applications, and much more. Thankfully you don’t have to start from scratch when implementing cybersecurity controls. Many standards and frameworks exist that can help you secure your IT systems properly.

Is NIST Mandatory?

You don’t have to spend a long time in the cybersecurity and information technology world before someone brings up NIST compliance. Since the agency’s inception in 1901 — yes, it’s that old — the National Institute of Standards and Technology has been trusted as the guardian of all proper measurements and standards, including cybersecurity standards meant to increase data security. NIST, which these days is part of the U.S.