Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

How Does Cryptography Work?

If you have been keeping up with the recent advancements in the cyber realm, you must have heard of cryptography. From popular films to ancient times, cryptography has always been discussed but gained much more significance in the recent years. Read our article and learn why! You must have done online shopping or created an account on a web platform before. While you are completing these tasks, you share sensitive and very valuable information.

Operationalize Ransomware Detections Quickly and Easily with Splunk

In 2019 multiple cities, hospitals and educational institutions in the U.S. were crippled by ransomware, including Baltimore, Atlanta, New York City, Regis University in Denver and Monroe University in New York. In the the last 12 months, the infosec community has seen these ransomware operators seriously upping their game (see Ryuk ransomware).

COVID-19: Response and Preparedness through the lens of Risk Management

The old adage warns “An ounce of prevention is worth a pound of cure.” The saying becomes even more pointed for threats that, unfortunately, do not yet have a cure. But the lessons of risk management offer a path forward, where prevention takes the form of avoiding, mitigating or reducing risks. As people and organizations confront COVID-19, the novel threat has inspired an array of new strategies to combat the pandemic.

How Organizations Can Fight to Retain Talent Amidst the Infosec Skills Gap

In a previous post, I shared some expert insight into how organizations can address the challenges of hiring skilled talent despite the ongoing infosec skills gap. Organizations can’t rest easy once they’ve brought on new talent, however. They need to make sure they hold onto their existing workforce. That’s easier said than done. Cybersecurity Ventures forecasted that a total of 3.5 million infosec-positions will be unfilled in 2021.

Weekly Cyber Security News 20/03/2020

A selection of this week’s more interesting vulnerability disclosures and cyber security news. For a daily selection see our twitter feed at #ionCube24. As many of us resort to working from home, the collaboration services we normally rely on are beginning to suffer. MS Teams, as well as Facebook and WhatsApp are experiencing unusual load. But apart from a the odd glitch things seem to be hanging on for now.

What is Identity and Access Management?

Identity and access management solutions are one of the best friends of your IT department. Keep reading to learn how and why. Identity and access management solutions (also known as the IAM solutions) offer unique and useful technologies for the cyber security professionals to help them control the user access within the limits of their organization. These solutions allow cyber security professionals to manage which user can access which information for how long.

Forensic Software - Getting the Proof You Need

Employees are both the biggest asset of a company and also the biggest risk factor. Forensic software is designed to provide visibility when malicious or incompetent employee behavior is suspected that could present a threat to the company. Trying to gather proof of these issues manually is both time consuming and high risk. If you tip off the staff member, they can cover the tracks, and you may never know what was done.

Konni Malware Campaign

Throughout 2019 CyberInt Research observed multiple events related to Konni, remote administration tool, observed in the wild since early 2014. The Konni malware family is potentially linked to APT37, a North-Korean cyber espionage group active since 2012. The group primary victims are South-Korean political organizations, as well as Japan, Vietnam, Russia, Nepal, China, India, Romania, Kuwait, and other parts of the Middle East.