Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

GDPR: Penalties for Noncompliance and How to Avoid Them

The General Data Protection Regulation (GDPR) is one of the world's most stringent data protection laws, designed to safeguard individuals' personal data in Europe. Since its implementation in May 2018, GDPR has significantly impacted how organizations collect, store, and process personal data. Noncompliance with GDPR can lead to severe penalties, including hefty fines and reputational damage, making it imperative for organizations to understand and adhere to its requirements.

Tanium Plays Critical Role in Supporting AstraZeneca's Mission to Deliver Life-Changing Medicines

Tanium shares the success story of customer and global pharmaceutical company AstraZeneca in securing over 125,000 endpoints across 125 countries using the Tanium XEM platform. The company consolidated multiple endpoint-management tools to improve agility, efficiency, and visibility across company functions, minimising the risk of a cyber-attack. This allows AstraZeneca leaders and scientists to prioritise their mission to focus on the patient and optimise their results.

Do not allow anonymous enumeration of SAM accounts

The two policy settings in the CIS Benchmarks control the ability of anonymous users to enumerate the accounts in the Security Accounts Manager (SAM). By enabling the policy settings, users with anonymous connections will not be able to enumerate domain account user names on the systems in your environment.

What is Access Control Management and Why Is It Important?

One of the most important aspects of modern cybersecurity is managing access to IT systems and data. Indeed, organizations that lack robust access management are putting a lot on the line, from customer trust to business revenue. This article explains access control management, explores its key components, and provides best practices for implementation.

Follow the Crypto Part 1: Why Fraud Teams Should Investigate Crypto Transactions

Nowadays, cryptocurrency is a buzzword in society. It’s mostly seen as a high-risk investment or associated with fast profit-making schemes. Despite this, its adoption has surged in recent years, and according to crypto.com, the number of cryptocurrency holders has now hit 580 million. Unfortunately, not all of them hold it for legitimate reasons. We are at a juncture where criminals have the knowledge, services, and tools to channel their illicit profits through cryptocurrencies.

CVE-2024-6387 OpenSSH RCE vulnerability ("regreSSHion") - Cato Networks impact and analysis

TL; DR – Multiple versions of OpenSSH are vulnerable to remote code execution. There is no working public PoC, and researchers have only been able to exploit the vulnerability under unique lab conditions. Cato Sockets by default do NOT have a publicly exposed SSH interface, it is always recommended to keep Cato Sockets LAN interface exposed only internally and use comprehensive network access controls to manage SSH access.