Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

MobiFin and INETCO partner to deliver cutting-edge digital banking and payments security

MobiFin, a leading provider of unified digital banking and payment solutions, has entered into strategic partnership with INETCO, an innovative real-time transaction monitoring and fraud prevention company. INETCO has established a significant global footprint by implementing its innovative solutions across more than 27 nations, serving some of the most prominent financial powerhouses worldwide.

FBI Warns of Cybercriminals Using Generative AI to Launch Phishing Attacks

The US Federal Bureau of Investigation (FBI) warns that threat actors are increasingly using generative AI to increase the persuasiveness of social engineering attacks. Criminals are using these tools to generate convincing text, images, and voice audio to impersonate individuals and companies. “Generative AI reduces the time and effort criminals must expend to deceive their targets,” the FBI says.

EP 67 - The Password Problem

In this episode of the Trust Issues podcast, host David Puner sits down with Andrew Shikiar, the Executive Director and CEO of the FIDO Alliance, to discuss the critical issues surrounding password security and the innovative solutions being developed to address them. Andrew highlights the vulnerabilities of traditional passwords, their susceptibility to phishing and brute force attacks, and the significant advancements in passwordless authentication methods, particularly passkeys.

Building a Scalable Permissions Service: Overcoming Challenges in Access Control

Permissions are at the center of every operation at Egnyte. Every interaction any user has with the system is bound to go through a stringent permission check,be it creating a file, copying it, moving it, sharing it, deleting it or using an operation as simple as adding comments. The permissions model is extremely crucial as without it, data leaks, incorrect access escalations, and unauthorized operations can occur.

Renewtech's Network Configurator: Secure, Custom, and Cost-Effective Networking

Renewtech's network configurator empowers businesses to build secure, tailored and cost-effective network solutions using refurbished equipment from trusted brands like Cisco and HPE. Combining high quality, seamless compatibility and eco-friendly practices, it's the ideal tool for modern IT infrastructure.

Crypto trading journals: What are they, and how can they help you?

The trading journal is a very underrated tool in the crypto trading landscape, but the truth is that it can come in handy when navigating such a complex market. Relying on instinct is never enough when investing in cryptocurrencies, and every smart trader knows the importance of having a system in place that allows them to take opportunities when they arise and make proper decisions. A trading journal is an essential part of this system, allowing traders to keep a record of their performance and refine their strategies accordingly, as it captures everything from the trading patterns to the wins and the setbacks.

Cybersecurity Content Creation Guide

Every cybersecurity vendor today depends, to some extent, on content marketing to get leads across various channels. "Content" refers to blog posts, ebooks, whitepapers, case studies, explainer videos, LinkedIn posts, etc. Basically, any marketing asset that carries a brand's product message to buyers in a way that they (should) find engaging. Almost every B2B company uses content marketing, but cybersecurity companies spend considerable effort on content because.

Top tips: 4 ways to secure your operational technology infrastructure against security threats

Top tips is a weekly column where we highlight what’s trending in the tech world and list ways to explore these trends. This week, we explore four ways organizations can secure their OT environment. Operational technology (OT) has evolved from largely manual processes to digital, automated, and data-driven processes in recent years. As more industrial processes go digital, organizations in this sector now face a vastly expanded attack surface.