Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Cybersecurity Risks & Implications of .ZIP Domains

Google’s recent introduction of ZIP top-level domain (TLD) addresses, although well intentioned has ignited a heated debate surrounding the potential cybersecurity risks associated with these domains. On the one hand, the move could make it easier for users to share and download files. For example, a website with the domain name “myfiles.zip” would be easier to remember than a long, complex string of numbers and letters.

INETCO Named a Finalist in the 2023 Technology Impact Awards

VANCOUVER, B.C. June 15, 2023 – BC Tech is proud to announce the finalists across 9 Technology Impact Award categories who achieved exceptional success in the past year. As BC Tech celebrates the 30th Anniversary of the Technology Impact Awards, this year’s awards celebrates 30 years of innovation in BC.

Best Code Signing Certificate Providers[CA] to Get Code Signing Cert

As we step into 2023, it becomes crucial for developers and organizations to identify the best code signing certificate providers who can offer top-notch security solutions without compromising affordability. At SignMyCode, we understand the significance of digital signing in safeguarding software applications from tampering, malware injection, and unauthorized modifications.

Hacker Gang SigedSec Makes a Statement By Hacking Fort Worth, Texas

Fort Worth is the fifth largest city in the state of Texas and approximately the 12th largest in the United States. The city is home to over 900,000 people and maintains a staff of thousands of individuals. The state manages a substantial amount of data in its servers, including public and private information that could be harmful if taken and shared with people online. That's why we were worried when we noted the city was breached, and over 500,000 files were taken.

MDR in 2023: Managed Detection & Response Solutions Today

In an ideal world, organizations should have round-the-clock protection for their corner of cyberspace, and prompt response to cyber-attacks. For this to happen, you’llneed top talent, equipped with sophisticated tools and knowledge of up-to-date security practices. But this is hardly the case for most organizations, meaning most are left vulnerable and seeking security solutions from third parties offering MDR services.

Cloud Threats Memo: A Recent Campaign Exploiting Digital Trust Through Github

The weaponization of digital trust involves exploiting an application or tool we use in our daily digital life to perform our business or personal tasks for malicious purposes. It is a technique increasingly used by the threat actors to carry out malicious actions such as the delivery of malware or links to phishing pages.

A Guide to Digital Forensics and Incident Response (DFIR)

When you engage in a security incident investigation, you need to quickly sift through vast quantities of data. In that moment, tracking your attacker, containing the attack, and identifying the root cause are the activities that matter most. However, in an attack’s aftermath, the digital recovery process and post-incident paperwork becomes your new nightmare.

Preparing for CMMC Compliance: Tips and Best Practices

‍The Cybersecurity Maturity Model Certification (CMMC) is a cyber program and security framework used by the US Department of Defense (DoD) to measure firms’ cybersecurity maturity. All DoD contractors working with the federal government must comply with this program by 2025. CMMC compliance demands that DOD contractors pass an external CMMC assessment carried out by an approved CMMC Third Party Assessment Organization (C3PAO) for all but the lowest level of CMMC certification.

What is a Third-Party Breach? Definition & Tips for Reducing Risk

A third-party data breach refers to a data breach that has occurred through a third-party company. In a third-party data breach, the vendor or supplier’s system has been compromised and used to steal data that belongs to you. A third party can be defined as an organization with which your organization has entered into a business relationship to provide goods, access, or services for your use.

Remediation Ballet Is a Pas de Deux of Patch and Performance

Generative AI capabilities continue to make their way into every organization, with increasingly useful ways of helping employees and contractors be more productive. This includes advancing how fully automated vulnerability remediation works, and with the power of generative AI, is able to take into account unique environments and uses in real-time.