Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

SOC 2 or ISO 27001 - Which One Do You Need?

In the wide world of information security, there are many different frameworks, standards, and systems in use to help assume a secure stance against threats. Two commonly seen frameworks are SOC 2 and ISO 27001. How do these two stand in comparison to each other, and which one do you need for your business? Let’s discuss.

Rackspace Breach Linked to Zero-Day Vulnerability in ScienceLogic SL1's Third-Party Utility

On September 24, 2024, Rackspace, a managed cloud computing company providing cloud hosting, dedicated servers, and multi-cloud solutions, reported an issue with their Rackspace Monitoring product in the ScienceLogic EM7 (ScienceLogic SL1) Portal. Rackspace utilizes the ScienceLogic application as a third-party tool for monitoring certain internal services.

Securing QR Codes: Protect Against Cyber Threats

QR codes have become part of daily life, enabling quick access to websites and services with a single scan. However, this convenience also makes them a major target for cybercriminals who exploit their popularity. The hidden nature of QR data can easily redirect users to malicious content or phishing sites without their knowledge. With the growing risks tied to this technology, businesses need to implement more advanced security measures. Simple practices like regularly checking code destinations and verifying source authenticity can help reduce vulnerabilities.

The Importance of Security in a Hybrid Work Environment

As hybrid work models become more and more prevalent among businesses, more are adopting hybrid work environments to maximize flexibility and productivity. Unfortunately, however, this creates unique security challenges which must be managed. One critical aspect of hybrid working environments is ensuring sensitive information remains safe. Since more employees work from various locations than before proper security measures - like secure file cabinet locks - must be put in place to safeguard valuable assets such as files.

How to Use Log Analytics for Insider Threat Detection

In the world of enterprise security, most teams are laser-focused on defending organizational IT assets from external actors: cybercriminals, digital fraudsters, state-backed hackers, and other external adversaries. But data on the frequency and cost of insider attacks suggests that security teams should shift their focus toward threats that originate from inside their organizations.
Featured Post

Is the Speed of AI Development Leaving UK SMEs Struggling to Plug Security Gaps?

Artificial Intelligence (AI) is perhaps one of the fastest evolving technologies in business today. For SMEs, it can be hard to keep up with these developments and sift through what's simply noise, and what will deliver tangible business benefits. As the UK data from our recent SME IT Trends report shows, embracing AI can help UK SMEs streamline operations, improve the admin and user experience, and stand out in a crowded marketplace. Without a doubt, choosing to ignore AI would be choosing to fall behind.

Understanding and Detecting Lateral Movement

A ransomware attack is underway. The threat actor has gained initial access to an endpoint and executed malicious code on it. As far as the threat actor is concerned, things are going well. However, the next stage is critical to a ransomware attack’s success. Without the ability to spread throughout the entire environment, encrypting or locking up all systems, threat actors are unlikely to be able to extort payment from an organization.

Saudi Arabia's PDPL

Saudi Arabia's Personal Data Protection Law (PDPL), enacted in 2021, marks a significant step in regulating the processing of personal data in the Kingdom. The PDPL aims to protect individuals' privacy by setting out clear rules on how personal data can be collected, processed, stored, and shared. As more businesses undergo digital transformations, the PDPL holds companies accountable for safeguarding data and ensuring transparency in their handling of personal information.

Governments Urge Stronger Security and Resilience for Undersea Cables

The U.S. government, along with global partners, is calling for immediate action to strengthen the security and resilience of undersea cable infrastructure. These cables, vital to the global economy and communications, transmit vast amounts of data, making them critical to the world’s digital infrastructure.