Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

China's New Mobile App Rules - Cybersecurity Updates 2022

The Chinese government took down over 2 million applications from Chinese app stores in just two years (2018-2020)! Now, the government has revised and published stricter cybersecurity updates or provisions for mobile app development, which will go into effect from August 1st, 2022. Why is this happening, and what does the new policy say? Also, how does it affect the developers within China? If you have these questions on your mind, this blog is for you.

Australia Recorded the Highest Rate of iOS & Android App Threats

Navigating the internet in 2022 is more dangerous than ever for Australian netizens. The risks to the privacy of Australian customers are at an all-time high, as the nation has reported the highest percentage of mobile threats globally, standing at 26.9%. The average Australian netizen uses web-based mobile apps to browse, entertain, communicate, and shop online.

How MSPs can overcome zero-trust barriers

Zero-trust cybersecurity strategies stimulate digital transformation of businesses. As this approach reduces threat risks appreciably, companies have more incentives to make changes to their systems or invest in new technologies. 59% of organizations take this view, according to the Watchguard Pulse Maturity of Zero-Trust in 2022 survey conducted with IT leaders from businesses across the world.

CIS Control 17. Incident Response Management

The Center for Internet Security (CIS) offers Critical Security Controls (CSCs) that help organizations improve cybersecurity. CIS CSC 17 covers incident response and management. (In earlier versions of the CIS controls, handling of security incidents was covered in Control 19.) CIS CSC 17 focuses on how to develop a plan for responding to attacks and other security incidents, including the importance of defining clear roles for those responsible for the various tasks involved.

CIS Critical Security Control 18. Penetration Testing

The Center for Internet Security (CIS) provides Critical Security Controls (CIS Controls) to support the evolving field of cybersecurity. CIS Control 18 covers penetration testing (this topic was covered by Control 20 in the previous version). Penetration testing is the intentional launch of cyberattacks in order to evaluate an organization’s security.

Six Steps to Achieve Zero Trust in Application Security

The continuing escalation in cyberattacks on large corporations, coupled with an acceleration of digital transformation, has forced organizations to reassess their security strategies and infrastructure. This escalation has driven growth in the adoption of zero-trust application security and compliance. The zero-trust approach means that no devices or software should be trusted by default, even if they have permissions and previous verification.

Preqin Moves to Secure Cloud File Sharing with Egnyte

London-based Preqin is an industry leading alternative asset research firm. With a dispersed global workforce, Preqin struggled with data access challenges from their aging local file servers. In this video, learn how Preqin leveraged Egnyte to support its new cloud-first strategy. Access from anywhere, backup and restore capabilities, secure file access and auditing were key reasons that Egnyte was selected. The company can now respond easily to Subject Access Requests (SARs) thanks to automated PII detection. Operational overhead for managing servers and manual backups and restores are a thing of the past, resulting in tremendous time savings.

All you need to know about data security and its benefits for small businesses

Cyberthreats don't affect only large enterprises and governments – they can also affect small businesses. According to research, nearly half of small businesses have experienced a cyberattack, and 69% are concerned about future attacks. Small businesses should be aware of cyber security statistics and take tangible steps to protect their businesses against cyberattacks.

Zero trust for cloud-native workloads: Mitigating future Log4j incidents

In my previous blog, I introduced the brief history of zero trust, the core pillars of a zero-trust model, and how to build a zero-trust model for cloud-native workloads. In this blog, you will learn how Calico can help mitigate vulnerabilities such as the recent zero-day Log4j vulnerability with its zero-trust workload security approach.