Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Comprehensive Mobile Application Penetration Testing:157 Test Cases [+Free Excel File]

Get Free Mobile Application Penetration Testing Checklist Even though iOS and Android come with robust security features, like secure data storage and communication APIs, they only work well if they’re set up right. That’s why thorough mobile app penetration testing is vital—to ensure these features are correctly integrated and protect your data effectively.

Striking a Balance Between Productivity and Security

Granting privileged access to an end user’s device is a common practice in organizations. Admins do it to give end users the ability to manage administrative tasks such as downloading applications and accessing resources on their devices. It can be done manually, which is cumbersome and introduces risks. Or it can be managed to improve user productivity without requiring additional IT help or intervention, so that IT can focus on higher priority tasks.

EP 49 - Secure Browsing and Session-Based Threats

In this episode of Trust Issues, David welcomes back Shay Nahari, VP of CyberArk Red Team Services, to discuss the topic of secure browsing and session-based threats. They delve into the dangers of cookie theft, the expanding attack surface, and the importance of identity security. Shay explains how cookies sit post-authentication and how attackers can bypass the entire authentication process by stealing them.

Ensuring Cyber Security for Your Forex Trading

The foreign exchange market is full of ups and downs, making it exciting but risky. And it's not just the market swings you need to watch out for; cyber threats are a genuine concern, too. As technology gets smarter, so do the risks, but thankfully, the ways to protect ourselves are getting better as well.

Navigating the Digital Transformation in the Insurance Sector

The insurance industry stands at a crossroads, with digital transformation dictating a new direction for traditional practices and operations. As customer expectations evolve and technology advances at an unprecedented pace, insurers are pressed to adapt, redefining their business models and strategies. This adaptation is not merely about adopting new technologies but also about embracing a cultural shift towards innovation, agility, and customer-centricity.

What Biometric Identification Solution is Suitable for National-Scale Projects?

Biometrics identification? It's everywhere right now, even in your pocket or handbag. You use it to unlock your mobile devices, make online purchases, and access secure facilities. Biometrics identification has stretched its benefits and use cases to national-scale projects. Government institutions currently use an automated biometric identification system, abbreviated as ABIS. This system is used for national-scale or large-scale biometric identification. So, what is an automated biometric identification system? What are its use cases in national-scale projects? Read on to learn more.

RaaS attacks are on the rise: Top 5 tips to protect your organization

Over the years, we have seen a substantial amount of cyberattacks happening around the globe. The most infamous of them is the RaaS attack, which is taking over organizations of all sizes. An employee’s sheer negligence and lack of cybersecurity solutions put organizations at higher risk. In this article, we will share some tips that every organization needs to know in order to stay away from cyberattacks. Ransomware attacks have become prevalent in recent years and can happen to any organization.

National Vulnerability Database Updates: How SecurityScorecard's CVEDetails can help

The National Vulnerability Database (NVD), the world’s most widely used vulnerability data source, has been having some problems recently, causing uncertainty and anxiety for everyone dealing with security vulnerabilities. Many organizations, including cybersecurity vendors, rely on CVE data provided by NVD. As a government organization operated by the U.S.

What Cybersecurity Metrics Should I Report to My Board?

‍ ‍ Chief information security officers (CISO) or respective organizational cybersecurity leaders are most likely well aware of the cybersecurity risks their organizations face. However, being aware of and communicating important cyber risk management data to the board of directors are two entirely different matters.