Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Protect Your Business from Ransomware as a Service

Cloud-based business models such as infrastructure as a service and software as a service have balloon in popularity, gaining mainstream acceptance in recent years. Cloud providers benefit from superior economic models that scale while also reducing their development risk and complexity. However, with success comes attention, so it’s only logical that criminals have emulated these models.

Fortinet, potential vector for Lockbit ransomware attack against Accenture

Accenture has acknowledged that it was the victim of a ransomware attack on July 30 in what it described as a "security incident." As reported by Cyberscoop, the hackers (a gang known as LockBit) began leaking stolen data and threatened to release further compromised information. LockBit first emerged in 2019 and its ransomware cyberattacks primarily target large corporations, from which it hopes to extort large sums of money.

Protect sensitive data with the right balance of AppSec tools and services

Using the right AppSec tools and services throughout the software development life cycle can help you properly secure your sensitive data. One of a CISO’s primary responsibilities is protecting their company’s digital assets, and adhering to current and emerging data privacy laws is crucial. Organizations must ensure that their corporate intellectual property and user data (e.g., customer, employee, contractor and/or prospect data) is safe from cyber attacks and data breaches.

HTTP/3 and QUIC: A new era of speed and security?

HTTP/3 is the third and upcoming major version of the Hypertext Transfer Protocol (HTTP) used across the web.HTTP has been the main protocol on the internet since the 1990s, with the second release (HTTP/2) introduced in 2015 as a major update with many new features. Whilst request methods and status codes will remain the same, HTTP/3 makes a departure from its predecessors by not using the Transport Control Protocol (TCP) as the underlying transport layer.

High Street Capital Acquires Controlling Share in NeoSystems

TYSONS CORNER, Va., September 8, 2021 – NeoSystems, a full service strategic outsourcer, IT systems integrator and managed services provider to the government contractor market, announced today that it is being acquired by High Street Capital, a Chicago-based private equity firm. Financial terms of the deal were not disclosed. The company will continue to be led by NeoSystems CEO and Co-Founder, Michael Tinsley, and Co-Founder and CTO, Rob Wilson, along with its current management team.

What You Need to Know About NERC CIP Compliance

Utility companies are increasingly being targeted by cybercriminals. Although the highest profile utility cyber attack in recent memory was the May 7 ransomware attack on Colonial Pipeline that caused gas shortages on the East Coast, power companies of all kinds are popular with criminals for a reason: they can’t afford a shutdown and they have the money to pay a ransom.

Explore and experience cybersecurity from a consulting point of view

The demand for highly qualified staff with the right skill sets along with hands on experience is not new news in cybersecurity. However, the difficulty of gaining experience prior to meeting the objectives for interviews for entry level jobs can be a tough hill to climb. Ample resources available online, including the ability to set up in-home labs, which helps.

Leveraging MISP and TheHive When You Create Your CTI Practice

Many CISOs I speak with across Europe tell me their cybersecurity teams rely on two, primary open-source platforms within their security operations (SecOps). The first is Malware Information Sharing Platform (MISP), that allows the storing and sharing of indicators of compromise (IoCs) with other MISP users. The second is TheHive, designed for security incident response (IR).