Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Top 10 Hacks Of The Past Decade | Solarwinds | WannaCry | Panama Papers | Cambridge Analytica |

Security breaches have become a normal part of our lives over the past decade, but each hack comes with its own complications and ramifications. In this webinar, Teleport Tech Writer Virag Mody will dive deep into the details of the top 10 hacks of the past decade and how they affected the way we approach cybersecurity.

Detectify ethical hacker kept the country code domain .cd safe from potential attacks

NEW RESEARCH – On December 30, Fredrik Nordberg Almroth, security researcher and co-founder of Detectify – the Sweden-born cybersecurity company that offers a web vulnerability service powered by leading ethical hackers – found a vulnerability that left the country code top-level domain of the Democratic Republic of Congo, .cd, open to severe potential abuse.

Security as Code: Why It's Important and What You Need to Know

Software is becoming an increasingly pivotal part of modern business and society. In turn, consumers have come to expect instant gratification. This has driven businesses to concentrate on innovation and speed to market. Businesses that can’t keep up with the hyper-competitive market of speed-to-value are falling behind.

Do's and Don'ts of Using Software For Monitoring Computers

According to the American Management Association, nearly half of employers monitor their employees’ digital activity on company-owned devices to some degree. Some of these employers manually read employees’ emails and track their activity. But the vast majority use software for monitoring computers, which is far more efficient. The right software can help you keep track of what your employees are doing during work hours, regardless of whether they are in the office or working remotely.

Tis' the Season for Giving - and Taking

It’s the time of year when many of us will be taking a well-deserved break, but unfortunately for consumers and organisations, cyber criminals don’t take holidays. A year of unprecedented alarm and uncertainty, coupled with the growing sophistication of cybercriminals, has nurtured the perfect breeding ground for online scams, which according to the Australian Competition and Consumer Commission (ACCC) have jumped a staggering 42% this year—with nearly AU$7 million lost.1

Teramind vs. ActivTrak | 2021 Feature Comparison

Teramind and ActivTrak are both popular employee monitoring software. Each of them has their strengths and weaknesses which might make it suitable (or not) for your unique business needs. The table below compares Teramind vs. ActivTrak side-by-side in terms of key features and capabilities so that you can decide which solution is right for you.

Red Team: O365 MFA Bypass To Device Compromise

The array of phishing vectors used by attackers is constantly expanding. On a daily basis we observe numerous different phishing themes such as voicemails, fake invoices and documents requiring signing. Recently, we have seen more topical themes such as US elections, COVID-19 and Brexit.