Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Why does preparing for AI attacks need to be your next big agenda?

This blog has been written by an independent guest blogger. Since its advent, the debate over its ethical and unethical use of AI has been ongoing. From movies to discussions and research, the likely adversarial impact AI has had over the world has been a constant cause of concern for every privacy and security-conscious person out there.

Top CMMC Compliance Challenges Experienced Professionals Encounter

With the deadline to comply with CMMC expected in May 2023, many in the Defense Industrial Base are scrambling to understand how to comply, the tools they need to comply, and the cost to comply. It’s a lot to get right, and there’s a lot riding on it—companies will need to comply if they want to do business with the DoD. That’s why we’ve developed a series of blogs, checklists and other assets to help contractors manage the complexity.

Cybersecurity Sessions podcast: My favorite moments from the first ten episodes

Almost a year ago, I took on a new challenge: Start a podcast about cybersecurity – The Cybersecurity Sessions, hosted by Netacea co-founder and CPO Andy Still. To be honest it’s not always easy finding the time to record the podcast between Andy’s more business-critical duties, but it’s a task he’s looked forward to greatly each month since last November. That’s because, like me, Andy is always seeking out new perspectives and information.

Ethical hacking & bug bounty hunting | Cybersecurity Sessions #11 with Jessica Haworth

Cyber-criminals are relentless, and the number of attacks is growing. Businesses are increasingly turning to ethical hackers to find bugs and exploits before attackers do, offering financial incentives for their efforts. As a security researcher, our host Cyril Noel-Tagoe is always on the hunt for new vulnerabilities. He’s joined for this episode by ethical hacking enthusiast and Daily Swig reporter Jessica Haworth, who has a finger firmly on the pulse of the latest bug bounty programs and developments.

What is Digital Onboarding? Why is it transformative for businesses?

Few things are more crucial for internet businesses than the Digital onboarding procedures for user online. You invest a lot of money into getting people to visit your website, and many companies dedicate entire departments to optimizing it so that visitors turn into customers. Nothing could be further from the truth: the onboarding phase is essential not only for your customer journey but also for fraud and risk reasons.

Offensive Security Migrates to The Underground

Recent years have taught us a lot about espionage in the cybersecurity world. As offensive security companies emerged at almost the same rate as ransomware groups, some got tangled up in diplomatic and political incidents, to a point where the countries that hired them left having to manage their losses. Over the past months, a new trend has emerged of criminal threat groups claiming to have connections to governments worldwide that hire their services for espionage and targeted data leak campaigns.