Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

5 Reasons Why Your Business Needs Penetration Testing

Nowadays, high-profile security breaches continue to dominate the media headlines. This trend places an increasing number of businesses at risk. They are growing in amount and complexity while malicious hackers are actively developing new and more sophisticated forms of attacks every single day.

Cybersecurity Is (Still) Everyone's Job

As noted previously—and as we all know—an organization cannot be secure until the entire workforce is engaged in reducing cyber risks. Each member of the group has the power to harm or to help, since each one has access to information systems, handles sensitive data and makes decisions every day which maintain, erode or strengthen the human “attack surface” of the organization.

Vulnerability scans vs Penetration tests

You’ll often find that ‘vulnerability scan’ and ‘penetration test’ are wrongly used interchangeably, creating confusion about which is the right security choice for businesses. Broadly speaking, a vulnerability scan could be thought of as a surface-level security assessment, whereas a penetration test delves that much deeper. In fact, penetration testers often make use of a vulnerability scan as part of their process.

Weekly Cyber Security News 16/11/2018

A selection of this week’s more interesting vulnerability disclosures and cyber security news. Quite an interesting stream of news this week, however, my choices this week focus on threat management. The first one, and its quite alarming and not at all funny, shows an example of someone didn’t accept reasonable proof of account ownership for a password reset – something many of us face with public websites.

Demo - Continuous security assessment for AWS

Netskope’s Continuous Security Assessment for AWS helps address the risk tied to misconfigurations that may lead to resources being inadvertently exposed to the internet. Netskope achieves this by continuously monitoring and auditing your AWS configuration, using the CIS benchmark, PCI-DSS, in addition to AWS best practices, to assess your compliance posture.

The Art and Science of Secure Coding: Key Practices that Stand Out

Flaws in code lines, file system and data input methods make up the core security vulnerability of any application. This is what we address through secure coding practices. Secure coding guidelines stand out as the last battling army before the enemy line of security risks and threats.