Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Improving Cyber Resilience: How Logsign Unified SO Platform Outshines SIEM, SOAR, and XDR

What are the key differences between SIEM, SOAR, XDR & Logsign Unified SO Platform? SIEM, SOAR, XDR and Logsign USO Platform are all cybersecurity technologies that help organizations detect, investigate, and respond to cyber threats. However, they differ in their scope, capabilities, and focus. Here are the key differences between them.

What is SSDLC (Secure Software Development Lifecycle) and 6 Steps to Take Now

The pressure to ship software faster to meet market demands is compromising security in a big way. As cyber criminals find ways to use the glaring disconnect between developers and security policies, companies consider security a necessity rather than a compliance measure. As a result, 2022 studies show that 68% of companies are shifting towards security and making developers share responsibility for a secure software development lifecycle.

Diskless Infostealer, next-generation delivery?

In a recent social-engineering attack targeting the hospitality sector observed by the ThreatSpike team, there appears to be a change in the tactics employed by the threat actor. The hospitality sector, where top-notch customer-service is expected, customer-facing employees are often lucrative targets for phishing, as detailed in our previous blog post.

Digital Aadhaar KYC: How Aadhaar Plus provides KYC compliant Aadhaar Verification

IDcentral’s flagship Aadhaar Card Verification product offers an advanced solution for seamless KYC (Know Your Customer) journeys, ensuring a seamless and hassle-free experience for end users. We understand that clients may encounter occasional service disruptions, which can affect the OKYC (Offline KYC) and e-KYC (Electronic KYC) processes.

Passkeys in iOS 17: Watch a sneak peek at what's coming to 1Password for iOS

We’re always captivated by WWDC, Apple’s annual developer conference, and the announcements shared during its keynotes and various breakout sessions. This year’s conference was particularly exciting because Apple unveiled a new passkey API that will be implemented in iOS 17. The API will enable password managers like 1Password to create and use passkeys inside any native app that has added passkey support, including Safari.

How to Record and Monitor RDP Sessions with Ekran System [Hands-on Guide]

Monitoring remote desktop protocol (RDP) connections to your infrastructure is essential for maintaining a secure IT environment and managing insider risks. Additionally, recording remote user activity on your organization’s servers and other critical endpoints is often a requirement of cybersecurity laws and regulations. This article will guide you on how to monitor RDP connections to your infrastructure server, Jump server, Citrix server, or any other endpoint with Ekran System Client installed.

PCI DSS 4.0 Requirements - Protect Stored Account Data and Protect Cardholder Data During Transmission

If someone asked you “are you protecting your data,” your initial response would probably be to clarify what they are referring to specifically, since the question is so broadly stated. You could just reply with a terse “Yes,” but that is as open-ended and nebulous as the question. The general idea of data protection encompasses so many areas, from the amount of data that is being stored, to the methods of securing it all.

What is Elliptic Curve Cryptography?

Elliptic Curve Cryptography (ECC) is a form of public-key cryptography that is based on the mathematics of elliptic curves. It provides a secure way to perform cryptographic operations such as key exchange, digital signatures and encryption. ECC is an alternative to Rivest-Shamir-Adleman (RSA) encryption, which was first released in 1977. Continue reading to learn more about elliptic curve cryptography and why it’s considered the most secure form of encryption.

Part 2: Federal Cybersecurity Posture is Improving, but Additional Work Remains

Former Texas Congressman William "Mac" Thornberry and Trustwave Government Solutions President Bill Rucker recently sat down to discuss several pressing issues impacting the federal government’s cybersecurity preparedness, the impact the Russia-Ukraine War has had on cyber, and what remains to be done to shore up the nation's cyber defenses. This is the second half of their conversation.