Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Logs in a SIEM: The Liquid Gold of Cybersecurity

Devices, applications, and systems logs are needed to detect, analyze, and mitigate cybersecurity threats. Logs in a SIEM are like gold; they are both valuable. Gold is part of the economy, and logs are part of the IT ecosystem and are the foundation for cybersecurity. Here’s why they compare to liquid gold!

Is It Safe To Send Tax Documents via Email?

Sending tax documents by email poses significant risks because emails are not fully encrypted. Emails can also be intercepted while in transit, making them vulnerable to unauthorized access. As a result, using email for tax documents increases the risk of identity theft and tax fraud. Continue reading to learn about the security risks of emailing your tax documents and what you should do instead.

How To Detect Spyware on an Android Phone

You can detect spyware on an Android phone by recognizing the following signs: your phone suddenly becomes slow, the battery drains quickly, unfamiliar apps appear, it overheats frequently, you receive strange messages or it makes weird noises during phone calls. Spyware is a form of malware installed onto your device without your knowledge. Once spyware is installed, a cybercriminal can spy on you and collect private information like passwords or credit card numbers.

Telegram Changes Privacy Policy, Agrees to Share User Data for Criminal Investigations

In a significant shift in its privacy policy, the messaging platform Telegram has announced that it will start sharing user data with authorities to aid in criminal investigations. Known for its strict stance on user privacy, this policy reversal marks a notable departure from the company's past operations. The platform, once regarded as a haven for privacy-conscious users, is now responding to increasing concerns over the use of Telegram by cybercriminals and other bad actors.

German Police Dismantle 47 Criminal Crypto Exchanges in Major Operation

In a significant blow to cybercriminal infrastructure, German law enforcement has successfully dismantled 47 crypto exchanges accused of enabling illegal activities, including money laundering. This operation, dubbed "Final Exchange," was led by the Frankfurt Public Prosecutor’s Office – Central Office for Combating Internet Crime (ZIT) and the Federal Criminal Police Office (BKA).

EP 62 - The Evolution of Identity

In this episode of the Trust Issues podcast, host David Puner sits down with Jeff Reich, Executive Director of the Identity Defined Security Alliance (IDSA), a nonprofit that provides vendor-neutral guidance on identity-centric security strategies to help organizations reduce the risk of identity-related attacks. They explore the evolution of digital identity, discussing how it has transformed from simple identifiers to complex, multifaceted digital identities for both humans and machines.

Announcing "Crafting Secure Software," GitGuardian's Guide to Security by Design!

Exciting news! Our first book, "Crafting Secure Software," is now available. Learn how to embed security throughout the SDLC, mitigate risks, and foster a security culture. Get your copy today and level up your software security game!

Navigating the Privacy Paradox: How Organizations Can Secure Customer Data While Ensuring Convenience

Privacy and convenience have always been at odds, especially regarding digital onboarding or online sign-ups. For modern organizations, striking a balance between the two has become increasingly important. At the same time, a recent report said 53% of customers suggest that they would give up their interaction with a brand if it took longer than two minutes, while as many as 87% expect basic levels of privacy to be met.