Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

What is typosquatting?

Hackers and cyber criminals have evolved social engineering tactics to trick unsuspecting individuals into divulging private information or valuable credentials. One such evolving tactic is typosquatting, a form of social engineering attack that tries to lure users into visiting malicious websites with URLs that are common misspellings of legitimate sites.

What are the NERC Reliability Standards?

NERC is a non-profit organization that sets industry standards, educates and trains industry personnel and provides guidelines for grids. You can find the details on NERC and NERC reliability standards in our article. What is NERC? NERC refers to the North American Electric Reliability Corporation. It is a non-profit organization whose main aim is to provide necessary regulations that reduce the risks regarding reliability and security.

Weekly Cyber Security News 24/01/2020

A selection of this week’s more interesting vulnerability disclosures and cyber security news. For a daily selection see our twitter feed at #ionCube24 As IoT encroaches further every day into our lives, often as a result of some marketing guy’s idea to flog their junk, the fear that it could all wreak havoc at some point catches me. This week a wonderful article hit my feed which highlights what could be reality for some now, and a great number in the years to come.

Healthcare security: How can blockchain help?

This is part 2 of a blog on healthcare security. For more info, check out part 1. An independent guest blogger wrote this blog. When it comes to data security, there is no more important place than the healthcare industry. When people go to the doctor, they provide all of their most sensitive information, from their health issues to their phone number, to a doctor they trust.

Do you trust your Microservices Identities?

Microservices provide great benefits to development organizations. They enable multiple autonomous development teams to work on the same application, maintaining efficiency,speed, and utilization of modern resources such as open source, containers and programming languages. The Microservice paradigm simplifies application building,debugging, management, deployment, scalability and of course time to market.

Ransomware: The average ransom payment doubled in just three months

A new report into the state of ransomware at the tail end of 2019 has revealed that things aren’t getting any better. In Q4 of 2019, according to the new study published by security firm Coveware, the average ransom payment more than doubled – reaching $84,116, up from $41,198 in Q3 of 2019.

What is Cybersecurity Performance Management?

Cybersecurity performance management is the process of evaluating your cybersecurity program's maturity based on top-level risks and the associated level of investment (people, processes and technology) needed to improve your security security to meet regulatory requirements and business outcomes. Security metrics improve decision making by helping risk management and security teams take a risk-based, outcome-driven approach to assessing and managing their organization's cybersecurity capabilities.

Data Protection, Regulation and Control hold Immense Possibilities for Consumers in the Future

Over the last few decades, volumes of domestic and cross-border data flow have skyrocketed. Predictions from a team of software experts from Techjury estimated that in 2020, each person will generate 1.7 megabytes in just a second. The increase in data volumes, while increasing the efficiency of organizations through real-time decision making has also increased security breaches where consumer data is being exploited for gain.

Elastic SIEM for home and small business: Beats on Mac

Hey, there. This is part six of the Elastic SIEM for home and small business blog series. If you haven’t read the first, second, and third blogs, you may want to before going any further. In the Getting started blog, we created our Elasticsearch Service deployment and started collecting data from one of our computers using Winlogbeat. In the Securing cluster access blog, we secured access to our cluster by restricting privileges for users and Beats.