Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

A Guide To Cuckoo Sandbox

Malware is a surefire knife that hackers and malicious cyber criminals use to attack organizations and corporations. Unfortunately, malware analysis in the current cybersecurity space is lengthy. It might take more than ten years to understand the size and complexity of recurring malware. Besides, detecting and eliminating malware artifacts in the current evolving period isn't enough. Security analysts also need to understand how the malware operates, the motivation, and the goals of the breach.

What is SecOps?

SecOps is a short form for Security Operations, a methodology that aims to automate crucial security tasks, with the goal of developing more secure applications. The purpose of SecOps is to minimize security risks during the development process and daily activities. Under a joint SecOps strategy, the security and operations teams work together to maintain a safe environment by identifying and resolving vulnerabilities and resolving any security issues.

Logit.io Achieves Cyber Essentials Certification

We are pleased to announce that we’ve recently attained Cyber Essentials certification with the NCSC in addition to our existing compliance with PCI DSS, SOC 2 & ISO 27001. The NCSC (National Cyber Security Centre) is the UK authority for monitoring cybersecurity incidents, conducting threat assessments and acts as an overarching technical authority for mitigating cyber threats.

How To Detect & Mitigate Apache Log4j CVE-2021-44228

If you've already heard about the Apache Log4j CVE-2021-44228 (also known as Log4Shell and formally LogJam) vulnerability then you will know that this is a significant issue as many organisations are scrambling to secure their infrastructure from this critical remote code execution (RCE) vulnerability. With these considerations in mind, we wanted to bring you a guide that outlines the steps that can be followed to ensure the security of your systems from CVE-2021-44228.

Interview with CTO Kathleen Moriarty

For the newest instalment in our series of interviews asking leading technology specialists about their achievements in their field, we’ve welcomed Kathleen Moriarty, Chief Technology Officer at the Center for Internet Security. During her tenure in the Dell EMC Office of the CTO, Kathleen had the honour of being appointed and serving two terms as the Internet Engineering Task Force (IETF) Security Area Director and as a member of the Internet Engineering Steering Group from March 2014-2018.

Interview with Bill Kunneke, Chief Technology Officer at Leasecake

For our latest specialist interview in our series speaking to technology leaders from around the world, we’ve welcomed Bill Kunneke, Chief Technology Officer at Leasecake. Bill has over twenty years of experience as an IT professional and a proven technical leader who delivers large and often transformative IT projects while communicating complex technical solutions to key stakeholders and executing strategic IT functions.