Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

From NIS to NIS2: What Your Organization Needs to Know

The first Network and Information Systems (NIS) Directive, introduced in 2016, was a key regulation that enhanced the EU’s cybersecurity posture, laying the foundation for protecting critical infrastructure and essential services from cyber threats. However, as cyber threats have evolved, so too must the regulations that protect against them. Enter NIS2—an updated and more comprehensive directive designed to address the gaps and limitations of its predecessor.

What is a Secure Web Gateway and why does my organization need one?

Back in 1999 Michael Capellas, former CEO of Compaq Computer, once said in a mission statement, “everything to the internet” as at that time every company large or small was trying to gain a presence online or start up an ecommerce site. Social media, smart phones, streaming services and the like were either in their infancy, or just an idea in someone’s brain! Fast forward nearly 25 years we now see this vision become realty. Everybody and everything are connected.

What is Database Security: Top 13 Best Practices

In today’s digitized world, the heart of any organization’s IT infrastructure is arguably its database systems. Databases host a wide range of information, from sensitive customer data to proprietary business intelligence — which makes them a top target for cyberattacks. As a database administrator (DBA), you need a solid grasp of database security to protect your organization’s databases from downtime and data breaches.

Managing the Use of Access Links in SharePoint Online

SharePoint makes collaboration and sharing exceedingly easy — which can put sensitive and regulated content at risk. Accordingly, administrators need to put guardrails in place that facilitate appropriate sharing and prevent data leakage. In SharePoint Online, the primary way for a user to grant access to resources is to share an access link with other people.

Deceptive AI: A New Wave of Cyber Threats

As artificial intelligence (AI) technology advances, its influence on social media has become more and more pervasive and riddled with challenges. In particular, the ability for humans to discern genuine content from AI-generated material. Our recent survey conducted with OnePoll on over 2,000 UK workers found that a substantial portion of social media users are struggling to navigate this new digital frontier.

The Number of Email-Based Cyber Attacks Detected Surge 239% in 1H 2024

New data shows the most prevalent and obvious path into an organization – email – continues to be exploited by a growing number of cybercriminals. Email is one of those technologies that doesn’t seem willing to be replaced by collaborative tools that connect individuals and organizations – in many cases – in far more productive ways. And because of this, cybercriminals continue to leverage email to gain access to users.

Integrating PAM with SIEM: Enhancing threat detection and response

When we think about privilege access management (PAM), we typically think about it first as preventive control. PAM solutions manage who has privileged access to systems, enforce least-privilege principles and monitor and record privileged user activity. This is crucial for preventing misuse of high-level permissions and ensuring accountability.

Future-Proofing Cybersecurity: 5 Insights from the Verizon MSI

Your organization’s most vulnerable points of attack are no longer desktops — they’re in the pockets of your employees. Virtually everyone has a mobile device. And, even on the job, we use them for a multitude of tasks. As a result, our devices are packed with critical information, making them rich targets for cybercrime. That crime comes at a high cost.

Yellow Card Integrates Fireblocks to Streamline Cross-Border Transactions in Africa

Fireblocks has launched support for Yellow Card, Africa’s leading stablecoin on/off ramp, to improve cross-border transactions for both businesses and individuals. By integrating the Fireblocks digital asset infrastructure, Yellow Card seeks to remove obstacles for global corporate treasury in accessing African markets by offering secure and effective on-chain solutions.

Google Fixes Actively Exploited Chrome Vulnerability

Google has recently released an urgent security update to fix a high-severity vulnerability in its Chrome browser. This flaw, identified as CVE-2024-7971, has been actively exploited by attackers, posing a significant risk to users. The vulnerability, rooted in the V8 JavaScript and WebAssembly engine, could allow remote attackers to execute harmful code via specially crafted web pages. As cyber threats continue to evolve, it is crucial for users to stay informed and ensure their browsers are up to date.