Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Risk Management

ICS Security Is a Team Sport

As we discussed in the first article in this series, there are many Internet-exposed control systems, but they are very different from traditional IT systems and require a different security approach. With these systems being so critical and controlling processes that can potentially lead to loss of life if they fail, what is being done to tackle this issue? In this article I’ll dive into this and more, looking at.

The Botnet is Back: SSC STRIKE Team Uncovers a Renewed Cyber Threat

A silent danger is sweeping through the world’s critical infrastructure. The SecurityScorecard STRIKE Team has uncovered a resurgence of Volt Typhoon—a state-sponsored cyber-espionage group from the Asia-Pacific region, known for its precision and persistence. This is no ordinary attack. Volt Typhoon exploits unprotected, outdated edge devices within targeted critical infrastructure.

9 Cyber Risk Management Trends in 2025 Every Business Should Know

‍The evolution of the cyber risk management landscape is constant, and with each passing year, market players find themselves in the position of having to readjust their strategies, whether in brand positioning, cybersecurity, or beyond, to account for these consequent changes. While some of the shifts are welcome, others are less so. Nevertheless, all require careful foresight.

How to Conduct a Comprehensive Base Security Assessment

Conducting a comprehensive base security assessment is crucial. It ensures the safety of personnel, assets, and information. With the rise of various threats, it's more important than ever to evaluate and enhance security measures systematically. A thorough assessment not only identifies weaknesses. It also assists in implementing effective security controls to mitigate risks. In this detailed guide, we will explore essential steps and best practices to perform a base security assessment. We will enable you to deploy effective security solutions tailored to your environment.

Investigating iOS 18's AI Capabilities

With the release of iOS 18, Apple has continued to expand its integration of AI technologies, positioning the iPhone as a powerful personal assistant capable of smart recommendations, advanced text and image analysis, and even predictive suggestions. Leveraging on-device machine learning, iOS 18’s AI features tap into user data to provide a personalized experience.

What is GRC in Cyber Security? Why is it Important?

Governance, Risk Management, and Compliance (GRC) in cybersecurity is a framework that is designed to help organizations align their security efforts with business objectives while also managing risks and adhering to legal and regulatory requirements. To implement GRC in Cyber security effectively, it is important to understand the purpose of each element and the part each has to play in improving an organization’s security posture.

Securing Port 139: Strategies to Prevent Unauthorized Access and Cyber Threats

In the realm of network security, safeguarding communication ports is a fundamental aspect of protecting a network’s integrity and confidentiality. Port 139, primarily used by the Server Message Block (SMB) protocol for file sharing in Windows networks, stands out as a critical point of vulnerability when not properly secured. This port facilitates network communications, allowing computers to share files, printers, and serial ports over a network.