Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Featured Post

How to Choose the Right ASVS Level for Your Organization

The Application Security Verification Standard (ASVS) developed by the Open Web Application Security Project (OWASP) provides a robust framework for conducting penetration testing (pentesting) and security audits of web applications and infrastructure. In the evolving landscape of network security, with risks emerging in sophistication and frequency, maintaining a baseline level of compliant security procedures is highly recommended.

Securing the Chain: A Comprehensive Guide to Blockchain Security Audits

In the realm of digital business, blockchain security audits are essential for implementing the best security practices and ensuring robust system security. It secures all complex online systems and networks, thereby enhancing their performance and ensuring compliance with modern standards. According to SlowMist's blockchain hacking incident archive, there were 464 security incidents in 2023, resulting in losses of up to $2.486 billion.
Featured Post

Why adopting a Zero Trust approach is not as straightforward as it might appear

The world has changed. With the move to hybrid working, the rapid adoption of cloud, increased use of mobile and IoT devices, and more, the attack surface of every organization has expanded and businesses are finding it harder than ever to protect their networks and digital assets. This will, no doubt, be the central theme for this year's Cybersec Europe, taking place on May 29th and 30th in Brussels. The event aims to arm visitors with the know-how and solutions to make their businesses cyber resilient and secure their digital assets. But it is not just about securing assets. Traditional boundaries have blurred between businesses, suppliers, customers, workers, and home-life.

KeeperFill v16.9 Update

The latest update to our KeeperFill Browser Extension offers users a refreshed, more intuitive experience. Keeper’s new user interface provides enhanced clarity and navigation – all improving usability in order for you to take full advantage of KeeperFill’s powerful auto filling capabilities. Upon logging in to KeeperFill, you will immediately notice a refreshed home screen, featuring a more modern UI. Records now conveniently appear directly on the home screen as a list, with “suggested records” at the top to easily fill the credentials that match the website you're on.

Safeguarding LLMs in Sensitive Domains: Security Challenges and Solutions

Large Language Models (LLMs) have become indispensable tools across various sectors, reshaping how we interact with data and driving innovation in sensitive domains. Their profound impact extends to areas such as healthcare, finance, and legal frameworks, where the handling of sensitive information demands heightened security measures.

AI's Role in Securing AEC Data: Paving the Path Forward

In the oft-obscure world of Architecture, Engineering, and Construction (AEC), the structures we see reaching for the skyline are not just feats of design and engineering but archives of data, each rivet and beam a data point in a colossal network of information. Yet, with these digital monoliths comes an invisible vulnerability – data control, a challenge that’s upending the AEC industry.

HITRUST: the Path to Cyber Resilience

Much has been made of cyber resilience in recent years. And with good reason: failing to bounce back quickly from a security event can have dramatic financial consequences. In early 2023, Royal Mail took several days to recover from a Lockbit cyberattack, losing upwards of £10 million in the process. However, for all the talk about resilience, the industry seems to be overlooking one of its fundamental tenets: risk management. It is, perhaps, understandable that we overlook risk management.

The Race to Secure Operational Technologies is On

Whether it's because industrial control systems remain quite vulnerable to attacks, or because these systems manage valuable physical resources and uptime is essential—or a bit of both—attackers are increasingly targeting operational technology (OT) and industrial control systems (ICS).