Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Developing Enterprise DFIR Skills with Markus Schober

In a recent ‘Defender Fridays’ session, we spoke with Marcus Schober of Blue Cape Security, a leading expert in Digital Forensic and Incident Response (DFIR) to explore the advancing frontiers of enterprise security. The webinar underscored the indispensable role of continuous learning, practical training, and cross-disciplinary collaboration in mastering the complexities of today’s cybersecurity challenges.

How Time, Entitlements and Approvals (TEA) Can Secure the Keys to Your Cloud

A popular topic of conversation in my day-to-day work is how to secure privileged access to cloud management consoles and workloads. And that’s no surprise, considering more and more applications and workloads are migrating to the cloud. Up until recently, the answer has typically been clear when it comes to identity security and privileged access management (PAM). It’s simple: first, you manage credentials by securing them in a vault. The next step is to rotate them.

Six Best Practices for Secrets Management

A secret refers to the non-human privileged credentials used by systems and applications to access services and IT resources containing highly sensitive information and privileged systems. Secrets allow applications to transmit data and request services from each other. Examples of secrets include access tokens, SSH keys, non-human privileged account credentials, cryptographic keys and API keys.

How Weak Passwords Lead to Ransomware Attacks

Weak passwords can lead to ransomware attacks because they can be easily compromised through password-cracking techniques, allowing cybercriminals to gain access to an organization’s network where they can then inject ransomware. Often, when people think of the causes of ransomware infections, their first thought is it was caused by a phishing email.

How AI Could Have Positive and Negative Effects on Cybersecurity

Artificial Intelligence is a game-changer technology that has created a buzz in today’s market, which we believe you can agree on. How has AI become a game changer in such a short span of time? Well, the hype is real, and it is because of the revolutionary tools and technologies that come into the market. That’s the one side of the coin! What about the other side? Yes, with these modern AI technologies, there is a fear which we overlooked and that’s security.

Phishing: The Grade A Threat to the Education Sector

Phishing is the most common method for an attacker to gain an initial foothold in an educational organization, according to the just released Trustwave SpiderLabs report 2024 Education Threat Landscape: Trustwave Threat Intelligence Briefing and Mitigation Strategies. Why phishing? Simplicity is the primary reason.

6 DevSecOps Best Practices that Enable Developers to Deliver Secure Code

In the realm of software development, DevSecOps has emerged as a transformative approach, merging the agility of DevOps with valuable security measures. As a methodology, DevSecOps is about proactively embedding security into the very fabric of the development process, ensuring that every code commit, feature addition, and software release is scanned and thoroughly reviewed for vulnerabilities.

Strategies for System Integrators: Implementing Secure ID Verification Solutions

In the rapidly evolving digital landscape, secure identity verification has emerged as a cornerstone of online security and trust. System integrators are at the forefront of deploying these solutions, ensuring that businesses can verify the identities of their users confidently. This blog delves into the strategic considerations and best practices for system integrators tasked with implementing these critical solutions.