Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Security Orchestration Use Case: How to Automate VPN Checks?

An organization can have innumerable VPN access attempts from within or outside its facility. In the world of globalization and cloud computing, even these attempts can be made from outside the country. Checking each attempt manually is a daunting task for enterprises as it consumes a lot of time and engages more security professionals. The basic VPN checks involve DNS Leaks, IP Address Leaks (e.g., IPv4 and IPv6), and WebRTC Leaks.

The REAL 2019 Cyber Security Predictions

It’s December, which means it’s time to get those 2019 cyber predictions going. While there are many well-informed, and some not-so-well informed opinions out there, I’ve dug through the cyber underground, I’ve climbed data mountains, and delved to the depths of the dark web to seek out what is really happening.

Detectify security updates for 13 December

For continuous coverage, we push out major Detectify security updates every two weeks, keeping our tool up-to-date with new findings, features and improvements sourced from our security researchers and Crowdsource ethical hacker community. Due to confidentially agreements, we cannot publicize all security update releases here but they are immediately added to our scanner and available to all users. This post highlights a few things that we have improved in the last two weeks.

A HIPAA Compliance Checklist

Maintaining security and compliance with HIPAA, the Health Insurance Portability and Accountability Act, is growing ever more challenging. The networks that house protected health information (PHI or ePHI) are becoming larger and more complex — especially as organizations move data to the cloud. At the same time, security professionals are faced with an evolving threat landscape of increasingly sophisticated threat actors and methods of attack.

Who Would You Hire in Your SOC?

I got curious about what kind of people are most desired in a Security Operations Center (SOC). I wondered how accepting InfoSec blue teamers would be to having a team member with a great attitude and system administration or network management skills, versus someone with deep InfoSec knowledge and skills. So I did a poll on Twitter to learn more.