Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CISA orders federal agencies to catalog their networks, and scan for bugs

You always want to know what is attached to your network. And whether it could be vulnerable or not. In any organisation it’s normal for different devices, on- or off-prem, wired or wireless, to be constantly added or removed – and this can present an opportunity for malicious hackers to take advantage of improperly secured systems. In many cases, organizations have no idea about how many assets they have, let alone where they are all located.

What to Know about APIs, the "On-Ramps to the Digital World"

An application programming interface, or API, is a defined process that allows data to be shared between applications or programs. Each API consists of a set of rules that dictates how communication occurs between a client and a server or external program. The required request format, the authentication process, and the encryption of data all have set guidelines so that the API knows what information to share and when and how to share it.

Spending Decisions in an Economic Squeeze

Inflation, stagnation… even stagflation and recession… these are the words that look like they will define global economies in 2022 and into 2023. There’s barely a country that is being spared the crunch, and we are already seeing heated debate among global politicians as to the appropriate fiscal response. Do we spend or save our way out of this?

Deliver a Strike by Reversing a Badger: Brute Ratel Detection and Analysis

A new adversary simulation tool is steadily growing in the ranks of popularity among red teamers and most recently adversaries. Brute Ratel states on its website that it "is the most advanced Red Team & Adversary Simulation Software in the current C2 Market." Many of these products are marketed to assist blue teams in validating detection, prevention, and gaps of coverage.

How to See Yourself in Cyber: Top Tips from Industry Leaders

It’s 2022 and as we all know, the world is a very different place. However, one thing that has not changed is the importance of cybersecurity. In fact, it’s more important now than ever before, as the SolarWinds hack and Executive Order prove. That’s why for Cybersecurity Awareness Month this year, we asked cybersecurity pioneers and leaders to get their insights on staying cyber safe. Here are their thoughts on CISA’s 4 Things You Can Do to See Yourself in Cyber.

Round up of the Singapore Digital Economy Agreement Mission 19th-22nd September 2022

From the 19th – 22nd September, Amit Rao, Vice President – Sales & Business Development Asia, was asked to be part of the UK’s DEA Mission delegation to Singapore, on behalf of Device Authority. The delegation comprised of high growth legal, cyber and safety tech companies.

How To Store Employee Personal Data Securely and Why It Matters

As an employer, you have both a moral and legal obligation to shore up sensitive information about your employees. Sensitive information includes genetic and biometric data, medical records, SNNs (social security numbers), and criminal history records, just to name a few. Fail to do so, and you will open yourself up to loads of risk. Hackers are constantly on the hunt for applicant and employee data that they can further sell on the dark web or use to perpetrate fraud.

ProxyNotShell-Microsoft Exchange Vulnerabilities

On September 29, Microsoft Security Threat Intelligence reported two significant zero-day vulnerabilities being exploited in the wild. The two vulnerabilities, named “ProxyNotShell”, affect Microsoft Exchange Server 2013, Exchange Server 2016, and Exchange Server 2019.