Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Deliver fair, bot-free hype drops with Netacea + Queue-it

It's 8.58am, the tickets to your favorite band's latest tour are about to go on sale and you're poised, credit card in hand, ready to secure the hottest tickets in town. Only, once you make it to the front of the virtual queue, the tickets have all been snapped up by scalpers. Or you're faced with the dreaded message, "server busy, try again later". If you think this is unfair, you’re not alone.

Thanksgiving Cyber feast: Safeguarding against seasonal scams

As the Thanksgiving season rapidly approaches, many look forward to the warmth of family gatherings, the aroma of roasted turkey, and the joy of gratitude. Yet, just as we prepare our homes and hearts for this festive season, cybercriminals are gearing up to unleash a different kind of feast—a cyber feast—rife with sophisticated scams targeting unsuspecting individuals and businesses alike.

How to strengthen cybersecurity in logistics companies

The demand for logistics services has risen sharply in recent years, especially in the wake of the e-commerce boom. Digitization of the sector has been a driving factor behind the development of the supply chain as it makes data processing more efficient and shipments faster. Sector growth, the mass of company and consumer data handled, and the decentralization inherent to the chain, means these services have become a target of interest for cybercriminals.

File encryption in Python: An in-depth exploration of symmetric and asymmetric techniques

In our modern world, we constantly share private, confidential, and sensitive information over digital channels. A fundamental component of this communication is file encryption — transforming data into an unreadable format using encryption algorithms.

Choosing the Best Cybersecurity Software for Healthcare

One of the most common industries to face high-profile cybersecurity incidents is healthcare. The healthcare industry is a prime target for cybercriminals due to the vast amount of healthcare data, critical services provided, and the large scale of hospitals, private practices, and clinics. The healthcare sector can significantly enhance its cyber resilience and avoid potentially damaging cybersecurity incidents by implementing a reliable cybersecurity software solution.

Citrix Bleed Vulnerability: SafeBreach Coverage for US-CERT Alert (AA23-325A)

On November 21st, the Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), Multi-State Information Sharing & Analysis Center (MS-ISAC), and Australian Signals Directorate’s Australian Cyber Security Center (ASD’s ACSC) released an advisory highlighting the ongoing exploit of the Citrix Bleed Vulnerability (CVE-2023-4966) by Lockbit 3.0 affiliates.

Beating the Security Talent Problem: The SRC Solution

In an era where digital threats are evolving rapidly, the need for skilled security professionals is at an all-time high. Companies are grappling with a unique dilemma: the acute shortage of top-tier talent in the cybersecurity realm. But hiring an entire team poses its own set of risks. From the complexities of team dynamics to the cost of hiring, the constant upskilling and the ongoing retention efforts, these risks and costs stack up quickly.

What is FFIEC Compliance?

As financial institutions navigate the ever-evolving challenges of cybersecurity, understanding and implementing the Federal Financial Institutions Examination Council (FFIEC) compliance becomes paramount. Here, we aim to be your guide, providing valuable information and practical hardening tips to help financial institutions not only meet but exceed FFIEC compliance standards. This blog will discuss.

C-Suite Liability & Cybersecurity: Navigating a New Era of Enforcement

Author: Owen Denby, General Counsel, SecurityScorecard On October 30, 2023, the SEC charged both SolarWinds and their CISO Tim Brown with defrauding investors, by failing to make disclosures about cybersecurity issues and vulnerabilities related to the massive nearly two-year long “SUNBURST” hack of the company.