Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Blogs

Creating noise: The emerging obfuscation technique designed to evade email security NLP detection capabilities

Our Threat Intelligence team has observed an emerging obfuscation technique, specifically used to make Natural Language Processing (NLP) detection capabilities less effective. Broadly, malicious actors are adding additional characters, break lines, and legitimate links to the end of a phishing email in an attempt to disguise their malicious payloads amongst the noise and evade NLP detection.

Beyond Passwords: Advanced API Authentication Strategies for Enhanced Security

Passwordless authentication for end users is taking the world by storm, offering organizations and individuals alike unprecedented security, user experience, and efficiency benefits. By all indications, the next generation of authentication for end users has finally arrived, sending the password the way of the dodo. Although they don’t get anywhere near the same hype, advanced authentication strategies for APIs are as critical as passwordless authentication for end-users.

Enhancing Detection Fidelity: Fight Alert Fatigue with Accurate and Reliable Detections

In today's rapidly evolving cybersecurity landscape, the importance of detection fidelity cannot be overstated. Security operations center (SOC) teams are overwhelmed by the sheer volume and complexity of alerts and challenged to differentiate genuine threats from false positives.

Ekran System Is Now Syteca

We’re excited to announce that at long last, our highly anticipated brand refresh is complete: Ekran System Inc. is now officially Syteca Inc.! Our new name reflects the evolution of our product and our growth as a trusted provider, delivering the capabilities needed to enhance your organization’s cybersecurity. The same team behind Ekran System now brings you the Syteca platform: a more powerful and flexible software solution to meet your unique cybersecurity needs.

3 ways real companies complete security questionnaires faster

Security reviews are a critical step in the buying process where prospects assess your organization’s security posture and evaluate the risks associated with your business. The process typically occurs just before a deal is signed and sealed—when the stakes are especially high. ‍ Anyone who’s been involved in a security review before knows all too well how time-consuming, clunky, and manual the process can be.

8 Compliance Challenges Enterprises Face in 2024

Compliance is a critical concern for businesses today, but navigating the rules can be overwhelming. With regulations constantly evolving, many organizations struggle to keep up. I had the opportunity to participate in a recent virtual panel with Ashish Tandon, Founder & CEO of Indusface. Over the years, I have consulted with multiple large enterprises across geographies and industries. Below are the top challenges that they face as far as compliance is concerned.

How to Safely Integrate LLMs Into Enterprise Applications and Achieve ISO 42001 Compliance

Enterprise applications, whether on-premise or in the cloud, access LLMs via APIs hosted in public clouds. These applications might be used for content generation, summarization, data analysis, or a plethora of other tasks. Riscosity’s data flow posture management platform protects sensitive data that would otherwise be accessible to LLM integrations.