Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

CISA Strategy for 5G Security and Resilience

In August 2020, the Cybersecurity and Infrastructure Security Agency (CISA) released its strategy to ensure the security and resilience of 5G infrastructure in the United States. Roughly every 10 years, the next generation of mobile communication networks is released, bringing faster speeds and increased capabilities.

Automated Validation Scans on Kondukto

Validation scans are great for bridging the gap between software developers and security engineers. Whenever an issue is closed by a software developer, Kondukto automatically triggers a new scan to ensure that the vulnerability has been fixed. If the same vulnerability is identified again, the issue is automatically reopened by Kondukto.

Weekly Cyber Security News 06/11/2020

A selection of this week’s more interesting vulnerability disclosures and cyber security news. For a daily selection see our twitter feed at #ionCube24.. I have always wondered what would happen if they were to call a victim with a little more clout. Shame the police advise to not actually engage with them, and as the comments go, where is the fun in that? I would probably go with the advice after personal experience.

Top 5 WFH Security Risks - and How to Avoid Them

IT leaders are being kept up at night by one big worry: the increased risk of a data breach due to more employees working remotely. Forty percent say this is their top concern when it comes to remote work. And with good reason. Remote work, especially when accelerated by events like COVID-19 pandemic, compels employees to work on unsanctioned devices, apps, and networks, increasing the attack surface for bad actors, and leaving few checks in place for careless behavior that leads to data leaks.

5 Best Tools for Secure Data Transfer

In 2018, it was estimated that more than 20 million people share files each day across a variety of platforms. Since the rise of remote work, that number has only skyrocketed. Every time your business shares a file internally, with a business partner, or to the public, the risk of that data falling into the wrong hands increases.

INETCO Recognized as a Leader in Payment Fraud Detection Solutions by Welp Magazine

Fraud is something that occurs every day across a variety of industries, causing trillions in losses each year. Hardest hit are the financial services and banking industries. In a recent article, Welp Magazine shared its top 13 picks for the best fraud detection startups. INETCO was extremely happy to be featured as a part of this list – selected for its innovative product and exceptional growth strategy.

Employee Monitoring For the Remote Workforce

Remote work has become increasingly popular over the last several years. But in 2020, the number of remote workers grew exponentially as a result of the coronavirus pandemic. Even though the lockdowns have ended, many companies have allowed their employees to continue working remotely. According to Gallup, 33% of workers in the U.S. are working remotely all the time and 25% of workers are working remotely at least some of the time.

Detecting Data Exfiltration Via the Use of SNICat

I used to have a cat who loved ice cream. I think I may have given her some as a kitten, and from then on, anytime that she saw someone eating ice cream she would do her best to try and steal some from them. And even if she didn’t really seem to enjoy a particular flavor, she still seemed driven to try and steal that person’s ice cream. Like my cat stealing ice cream, bad guys are constantly trying to target organizations and their data for nefarious purposes.

What is a Cloud Access Security Broker? CASB explained

A common component of modern cybersecurity infrastructure, a cloud access security broker (CASB) is technology that provides monitoring and mitigates risks from employee use of cloud services. CASBs were initially developed to fill a gap in cloud security visibility left behind by traditional firewalls, next-generation firewalls, and early secure web gateways, which struggled to identify instances of the unapproved use of cloud services, otherwise known as shadow IT or rogue IT.

Best data security practices when offboarding employees

In times long gone, disgruntled former employees could only do so much damage to your company, and relatively little at all to your data security. In the fast-moving world of the 21st century, however, it’s a different story. Costly data breaches and devastating thefts have been undertaken in recent years by dissatisfied staff members released from their job duties.