Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

One Identity Manager version 9.2 has been released GA

Identity Manager governs and secures your organization’s data and users, meets uptime requirements, reduces risk and satisfies compliance by giving users access to data and applications they need – and only what they need – whether on-premises, hybrid or in the cloud. Now, identity security can be driven by business needs, not by IT capabilities. With Identity Manager, you can unify security policies and satisfy governance needs — today and long into the future.

The Difference Between Securing Custom-Developed vs. Commercial Off-the-Shelf Software

Modern applications are designed to process, use and store vast amounts of sensitive data. As adversaries seek to infiltrate these applications, IT and security teams must ensure the software they use has the strongest possible security. The first step to implementing strong application security is understanding the type of application you need to protect. The two types of applications security teams must be familiar with are custom-developed software and commercial off-the-shelf (COTS) software.

Bluejacking vs Bluesnarfing: Exploring Bluetooth Hacking Variations.

Imagine walking down the street, innocently scrolling through your phone, completely unaware that someone nearby is attempting to hijack your Bluetooth connection. It sounds like a scene straight out of a spy movie, right? Well, this kind of covert hacking, known as bluejacking and bluesnarfing, is a growing concern in today’s digital age.

Top tips: Zero-day vulnerabilities in mobile apps-top 5 risks and mitigation strategies

Top tips is a weekly column where we highlight what’s trending in the tech world and list ways to explore these trends. This week we’re identifying the risks and vulnerabilities associated with mobile apps and discuss strategies to mitigate them. In our digitally connected world, mobile apps have become an integral part of our daily lives. We depend on them for communication, productivity, entertainment, and much more.

Tanium is a Proud Participant in the Microsoft Security Copilot Partner Private Preview

Tanium announces its participation in the Microsoft Security Copilot Partner Private Preview. Tanium was selected based on its proven experience with Microsoft Security technologies, willingness to explore and provide feedback on cutting edge functionality, and close relationship with Microsoft.

TON Wallet: A Guide to Telegram's Crypto

The TON wallet has had quite a challenging journey, especially in dealing with regulators right from the start. Until recently, the Telegram wallet app project remained in the realm of a test version, having somewhat discredited itself in the eyes of investors a few years ago due to legal disputes with the SEC, which led to its folding. Today, those times are behind, and TON is fully operational. Its convenience is top-notch as it is seamlessly integrated into the popular messenger Telegram, allowing users to make payments and reap the benefits.

What is purple teaming and how can it strengthen your cyber security?

To defend against rapidly evolving cyber threats, businesses need to continually adapt and innovate. This means that red and blue teams must work together on an ongoing basis to maximise their individual and collective impact. Purple teaming allows them to achieve this more effectively, significantly advancing organisations’ security posture.

Trustwave MDR: The Pivot Point That Enhances Multiple Security Tools

Several years ago, Trustwave, already a leader in Managed Security Services (MSS), recognized the shift in market needs and fully pivoted to its future as a Managed Detection and Response (MDR) leader. Trustwave's leadership chose this course because it understood that a leading cybersecurity solution provider could no longer be effective without all the weapons MDR brings to the fight.

How To Safely Shop Online

You can shop online securely by shopping on reputable websites, using strong and unique passwords when creating online shopping accounts and watching out for phishing scams. The internet has allowed retailers to sell online and provide a convenient way to shop; however, online shopping also exposes people to potential cyber attacks that can put them at risk of losing their personal and financial information.

Stories from the SOC: Proactive steps to protect customers from misconfigured MFA

Multifactor authentication, or MFA, provides users with an added layer of security when logging into web applications. Surpassing its predecessor, two-factor authentication, in 2023, MFA is a standard option for another layer of security for online accounts. . In May 2022, the Cybersecurity & Infrastructure Security Agency (CISA) published security advisory AA22-074A describing how default configurations within MFA applications are considered a vulnerability.