Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Arctic Wolf Hailed as a Leader for Innovation, Culture and Business Growth by Prestigious National Awards

Exciting times are here at Arctic Wolf. This week, we celebrated a pair of awards recognizing our status as an industry innovator and employer of choice, with rankings on both the Forbes Cloud 100 and Fortune Best Medium Workplaces list.

Abusing Google Sites and Microsoft Azure for Crypto Phishing

Throughout 2022, Netskope Threat Labs found that attackers have been creating phishing pages in Google Sites and Microsoft Azure Web App to steal cryptocurrency wallets and accounts from Coinbase, MetaMask, Kraken, and Gemini. These phishing pages are linked from the comment sections of other websites, where the attacker adds multiple links to the phishing pages, likely to boost SEO and drive victims directly to these pages.

Cyber Threats - The New Norm in Data Security

These are some of the opening words in the new survey published by ISMG and HelpSystems in the ‘Data Security Survey 2022’. The survey explores how COVID19 has permanently changed how CISOs approach Data Security. It is an important study because it recognises that in a world which is in a rush to return to ‘normal’ (whatever normal is now), change has come, and we need to respond to it.

Gather Your Team and Conquer Dystopian Vendor Security Reviews

Let’s talk about vendor security reviews. If you felt some form of unpleasant emotion just reading the phrase “vendor security review,” I understand. You and I are not so different. You have likely participated in completing at least one vendor security review in your career. During the process you may have questioned humanity, your career choice or at least whether or not your company should be doing business with the procuring organization.

Introducing 1Password 8 for iOS and Android

1Password has been rebuilt from the ground up for iOS and Android. It's everything you need for a worry-free digital life on the go. Make it yours with a customizable home screen. Stay in the know with the Watchtower dashboard. 1Password for iOS and Android is all-new with a fresh, modern design and the most personal experience we’ve ever built for mobile.

A Complete Guide on SOC2 Audit Process

SOC2 Audit can be a daunting task, especially with the detailed assessment process that it involves. Organizations need to prepare for the audit to ensure they meet the requirements and pass the audit. So, for the benefit of our viewers and organization who plan to go through SOC2 Audit, VISTA InfoSec conducted an informative webinar on “A Complete Guide on SOC2 Audit Process”. Watch the video and learn the knack of navigating effortlessly through the audit process and ensuring a successful Audit and SOC2 Attestation.#soc2 #soc2audit

5 Common Cybersecurity Mistakes You Can Easily Prevent

A comprehensive organizational strategy and robust company security policy are crucial for effective cybersecurity. A company needs to make a concerted effort to design, execute, and follow through with a plan to deal with cyber-risk management from top to bottom. There is no one-size-fits-all strategy for the needs of enterprises in managing cyber risk. But in order to maintain strong system security in the face of constant threats, there are some core principles that every company should follow.

Logicalis Acquires Q Associates to extend specialist Microsoft and data-centric IT services capabilities across their UK&I operation

Logicalis today announced it has acquired Q Associates, one of the UK's leading providers of IT consultancy and advisory services around data management, data protection, compliance and information security.