Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

Top 7 Tips for Improving Cyber Risk Management in 2019

With the constant barrage of headlines regarding breaches in the last few years, it seems that society in general has become numb to losing personal data. This year’s overarching cybersecurity theme is clear: We’re all in this together because we simply can’t do it alone. Effective defense demands a team effort where employees, enterprises, and end users alike recognize their shared role in reducing cybersecurity risks.

3 Tips for Enterprise Patch Management

A few weeks ago, I woke up one morning to discover that Android had 34 software updates waiting for me. This was followed by my laptop wanting to reboot after installing the latest patches from Microsoft; my tablet needing a reboot after its latest firmware update; and my server screaming for me to put “yum” into action to install the latest patches available from Red Hat – all before 10:00 am in the morning!

Guest blog: Eray Mitrani - Hacking isn't an exact science

Eray Mitrani works for Nokia Deepfield where they are providing network analytics and DDoS-protections. He is a security researcher in the Detectify Crowdsource community. In the following guest blog, he goes through the process of finding and submitting his first module to Detectify Crowdsource, which is an authorization bypass.

Securing Your Business' Cloud

As you plan to leverage cloud-based IT resources, you must first extensively analyze and evaluate the different risks associated with using such a disruptive technology like cloud computing. In many cases, business' inability to protect their data stored in the cloud is often a direct outcome of needlessly complicating the cloud security thought process.

Enhancing Egnyte for AWS Solution

Trends in computing shift back and forth like the ebb and flow of a tide. Before personal computers became household appliances, centralized computing from a client-server approach was the norm. However, widespread distribution of desktop machines lead to a change in office productivity; decentralization. People began saving their files on the same, inexpensive devices they worked from, while simultaneously using these machines to run an array of applications.

What Are the 5 Components of the COSO Framework?

In 1985, The Committee of Sponsoring Organizations of the Treadway Commission (COSO) originally formed to enable the National Commission on Fraudulent Financial Reporting. COSO’s original goal, to review causal factors leading to fraudulent financial reporting, ultimately evolved as more technologies became embedded in the process.

Malware: Three Industry Problems and How to Solve Them

In the last few years, organizations have been subject to extortion through ransomware. Now, hackers are bypassing the nasty business of trying to get people to give them cryptocurrency to simply hijacking your processor to mine for cryptocurrency. As a result, the methods employed are growing in sophistication and creativity, including using internet memes to compromise systems.

CSOs: 69% of Data Breaches are Attributed to Employee Negligence, Theft, or Sabotage

Recent findings report that on average, 96 percent of systems across all industry segments have been breached. While you should absolutely update your information security system and protocols to provide the best protection you can for your data, you should also know how to spot a data breach. Unfortunately the odds of escaping one aren’t in your favor, but you can increase your chances of spotting a breach quickly and containing any damage.