Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

The Security Playbook for Remote-first Organizations

The sudden shift to remote work in 2020 exposed companies to a variety of new security challenges that haven’t gone away. Review the seven most crucial areas of security for emerging remote-first organizations. Continue reading below or feel free to download a copy of this playbook. We’ll also include our free Post-COVID Security Checklist as a reference you can keep in your back pocket.

How OpenBullet is used and abused by cybercriminals

OpenBullet is a testing suite of software allowing users to perform requests on a target web application. The open source tool can be found on GitHub and is used by businesses for various legitimate purposes including scraping and parsing data and automated penetration testing. Although designed to aid security professionals, in the wrong hands OpenBullet can be abused for the opposite purpose.

The 2022 Cyber Essentials update: what's involved?

Cyber Essentials is a government-backed and industry-recognised initiative which aims to raise cyber security awareness and help businesses mitigate common internet-based threats. The Cyber Essentials update is the biggest overhaul of the scheme’s technical controls since it was first launched in 2014.

CMMC Town Hall With Matt Travis - CEO, CMMC-AB | 1/12/22 | NeoSystems

NeoSystems CMMC Town Hall Series: Join NeoSystems’ Chief Information Security Officer, Ed Bassett, for our weekly CMMC Town Hall designed for the Defense Industrial Base and GovCon community. Each session features special guests and offers an opportunity for attendees to ask questions regarding CMMC and cybersecurity. Topics covered include CMMC compliance requirements, how to prepare for CMMC certification, and the latest updates from the CMMC AB.

Data Privacy Day, Part 1: What you need to know about data privacy

Data Privacy Day (known in Europe as Data Protection Day) is an international event aimed at raising awareness about data privacy and protection practices among businesses as well as internet users. In this blog series, we’ll attempt to do the same. This first blog post will shed light on data privacy as a whole, important data privacy laws, and some data collection practices that can help you adhere to these laws.

Crossword Cybersecurity Supports British Educational Suppliers Association Members with Cyber Essentials Certification and Access to Rizikon Assurance

Crossword Cybersecurity Plc is today announcing that its online software assurance platform, Rizikon, is being made freely available to the British Educational Suppliers Association ("BESA") as a single-use cyber security assessment to support them towards Cyber Essentials certification.

Elevate AWS threat detection with Stratus Red Team

A core challenge for threat detection engineering is reproducing common attacker behavior. Several open source and commercial projects exist for traditional endpoint and on-premise security, but there is a clear need for a cloud-native tool built with cloud providers and infrastructure in mind. To meet this growing demand, we’re happy to announce Stratus Red Team, an open source project created to emulate common attack techniques directly in your cloud environment.

Early Bird Catches the Wormhole: Observations from the StellarParticle Campaign

Supply chain compromises are an increasing threat that impacts a range of sectors, with threat actors leveraging access to support several motivations including financial gain (such as with the Kaseya ransomware attack) and espionage. Throughout 2020, an operation attributed to the Foreign Intelligence Service of the Russian Federation (SVR) by the U.S.

DevSecOps plan process

In the DevOps and DevSecOps Introduction, What is DevOps, we reviewed how our security teams overlay onto DevOps for visibility and increased security throughout the software lifecycle. This article explores DevSecOps during the planning phase of the project and why it’s important for developers to be trained on how to help protect the software they are writing from Free Open-Source Software “FOSS” risks and supply chain attacks.