Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Understanding NTLMv1, NTLMv2 and NTLMv2 Session Security Settings

NTLM has three versions - NTLMv1, NTLMv2 and NTLMv2 Session Security. NTLMv2 is supposed to offer better security than its previous version, and to some extent it does provides better defense against relay and brute force attacks, but does not completely block them. NTLMv2 Session Security is a session security protocol that can be used in conjunction with NTLMv1 or NTLMv2 to provide additional security.

An 8-step HIPAA compliance checklist to meet privacy and security requirements

HIPAA, an acronym for the Health Insurance Portability and Accountability Act, is one of the most important federal regulatory frameworks for healthcare organizations. It’s an elaborate law that imposes many stringent requirements for patient privacy and data security on governed organizations. Complying with HIPAA demands having a strict internal system to address its often complex and ambiguous requirements.

Security in FinTech: Q&A with Dan Kindler, co-founder & CTO of Bound

Hi, I’m Dan Kindler and I’m the CTO and co-founder of Bound. We focus on making currency conversion and hedging cheap, fair, and most of all, easy. Our platforms help hundreds of businesses protect themselves from currency risk across the world. Currently, about half of our team is composed of engineers.

Enhancing Enterprise Risk Management With Cyber Risk Quantification

‍Managing risk is a part of life, whether it's in the personal, private, public, or professional spheres, but often, these various areas of vulnerability are addressed in isolation. In the corporate world, too, the various components of business risk were once tackled as mutually exclusive, with each departmental leader focusing on their sole area of expertise.

CIS Control 18 Penetration Testing

Penetration testing is something that more companies and organizations should be considering as a necessary expense. I say this because, over the years, the cost of data breaches and other forms of malicious intrusions and disruptions are getting costlier. Per IBM Security’s “Cost of a Data Breach Report 2024,” the average cost of a breach has increased 10% year over year, with the healthcare sector having the highest cost breaches for 14 consecutive years.

Combating Content Theft: Maximize Revenue by Securing Your Content

Content scraping is on the rise. While it can benefit your business in some cases, it can also lead to lost revenue, degraded website performance, and content theft. Web scraping is a hot topic in tech news. This trend links to the rise in AI tools, specifically LLMs (large language models), which rely on content to generate their outputs. They scrape content from across the web to train these algorithms. This is a controversial subject with moral, technical, and legal implications.

The Role of the NIST CSF in Cyber Resilience

Resilience is one of the hottest topics of the moment, but for good reason. For most organizations, suffering a cyberattack is a matter of when, not if. Attackers are, lamentably, always one step ahead of defenders and, as such, responding to an attack and maintaining business operations have become arguably more important than protecting an organization in the first place.

How To Protect Your Debit Card From Being Hacked

You can protect your debit card from being hacked in several ways, such as using your credit card for purchases instead of your debit card, securing your bank accounts with strong passwords and using secure networks for online purchases. Debit card fraud can occur through phishing attacks, data breaches, card skimming or even theft of your physical debit card. If your debit card is hacked, it can lead to your money and identity being stolen.

Real-Time Secrets Security for Developers with GitGuardian's Extension for Visual Studio Code

Enhance your secure coding practices with GitGuardian’s Visual Studio Code extension. Detect secrets in real-time by embedding security into developers' workflows, boosting productivity and ensuring compliance.

Fidelis Network Detection and Response (NDR): Proactive Cyber Defense for Evolving Threats

As cyberattacks are becoming more sophisticated, traditional security measures such as firewalls and intrusion detection systems (IDS) are no longer sufficient. That’s why Network Detection and Response (NDR) is brought into the picture, to provide better and advanced solutions. It comes with real-time detection, automated responses, and advanced analysis. This blog focuses on the protective defense capabilities of NDR in cyber security.