Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Greening the Digital Frontier: Sustainable Practices for Modern Businesses

The push towards digital transformation has significantly improved efficiency, productivity, and accessibility for businesses globally. However, the environmental footprint of digital operations has increasingly become a focus for concern. As companies continue to leverage digital technologies, the need for integrating sustainable practices into their operations has never been more critical. This article delves into the environmental impact of digitalisation and outlines practical strategies for businesses aiming to achieve sustainability in the digital age.

Email Deliverability: Finding and Fixing Issues with GlockApps

Are your email campaigns not producing the expected results? Do you have disappointingly low open rates, or worse, are your emails getting lost in the spam folder? If so, you're not alone because almost every marketer faces email deliverability issues. But there is good news, and it is that they're not impossible to overcome. In this article, we'll cover the ins and outs of finding and fixing email deliverability issues so that your messages are received by your audience and read on time.

Five worthy reads : Securing the connected world thru cybersecurity in the IoT era

Five worthy reads is a regular column on five noteworthy items we have discovered while researching trending and timeless topics. This week, we will be discussing the challenges of cybersecurity in the IoT era and how it can be secured. The Internet of Things (IoT) has revolutionized the way we live and work, with hundreds of connected devices now integrating into our daily lives. However, this rapid expansion of IoT has also brought new cybersecurity challenges.

Dual Defenses: 9 Reasons Why Open NDR Is Essential Alongside NGFW

Securing a network against the myriad of evolving cyber threats requires more than just a robust firewall or endpoint protection platform; it demands a multifaceted approach. Corelight’s Open Network Detection and Response (NDR) Platform complements and significantly enhances the effectiveness of next-generation firewalls (NGFWs). Here are 9 reasons why adding Corelight to your cybersecurity arsenal, alongside existing NGFWs, is not just an upgrade but a strategic necessity.

The Importance of Security Log Management

Organisations are often introducing new hardware and software to their ever-evolving IT infrastructures in a bid to remain competitive. However, a lack of monitoring on these solutions will pose a significant risk of vulnerabilities that malicious individuals could look to exploit. Cybercriminals are constantly scouring for weaknesses within organisations' IT environments, that they can exploit via unethical strategies and hacking techniques.

Addressing the active exploitation of Ivanti VPN vulnerabilities (urgent advisory)

A recent advisory issued by the Cybersecurity and Infrastructure Security Agency (CISA) has shed light on vulnerabilities in Ivanti VPNs that are currently being actively exploited by malicious actors. Ivanti VPN solutions, widely utilized for their robust security features and efficient network management capabilities, have recently been identified as containing critical vulnerabilities.

Navigating the EU compliance landscape: How Detectify helps support customers in their NIS2 Directive, CER, and DORA compliance challenges

Navigating the complex and ever-changing compliance landscape is difficult for many companies and organizations. With many regulations, selecting the appropriate security tooling that aligns with the compliance needs of your business becomes a significant challenge.