Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Are you CCRI ready?

Nobody likes getting audited or inspected. Well, almost nobody; there’s always one person who consistently blows the curve. They gleefully anticipate inspections because they know they’re going to get a glowing review. We all have names for that person, most of which shouldn’t be included in a business blog. But what if, (bear with me) we could be that person?

Tech-Forward Countermeasures in the Fight Against Identity Theft

Technology has expanded the avenues bad actors use to steal identities and sensitive data. However, digital tools are also giving users innovative countermeasures to protect themselves. Here are seven tactics anyone can use to help prevent identity theft.

Windows 10 most critical vulnerabilities in 2022

Microsoft Windows 10 tops the list in terms of users around the world. Among those users, some belong to IT backgrounds but a majority of those users are not acquainted with IT, which means that they have limited knowledge about cybersecurity and its importance. Companies like Microsoft are prone to multiple attacks by bounty hunters or even black hat hackers intending to disturb the company’s operations.

Detection notes: In-memory Office application token theft

When we hear the term “Credential Access” our detection engineer thoughts typically turn to the Windows LSASS Process and tools like Mimikatz. Recently, however, researchers have drawn our attention to Microsoft Office processes. These processes also store credential material, in the form of access tokens.

How to Improve your Automotive Software Security

The automotive industry is fast evolving, characterised by changes in vehicle architecture, user experience, and automotive software. Automobiles are not only limited to transportation. Car owners now expect their cars to function like smart devices that can perform other tasks like streaming music and other cloud-based functionalities. While these are great, these added functionalities can impede the ability of car manufacturers to meet vehicle safety and security requirements.

How to Improve your Cyber Security Compliance

Authorities have warned businesses to strengthen their internal controls in response to the increasing cases of physical security breaches. While large companies have invested a lot of money to secure their IT networks, cybercrime gangs have turned their attention to low-tech methods. According to estimates, cybercriminals generate around £1.2 trillion yearly from cyber acts, which will likely increase over the coming years.

RKVST supply chain evidence management platform now available to the public sector through UK Government G-Cloud

RKVST™ announces its award-winning enterprise SaaS solution is now available as an assured cloud service through G-Cloud 13, the UK Government's cloud services procurement framework.
Sponsored Post

Financial Cybersecurity: Are Banks Doing Enough to Protect You?

Financial Services are valuable targets for cybercriminals. As the guardians of our financial information, banks hold a wealth of data that can be used to steal identities and commit other fraud. In this blog post, we'll take a look at the steps banks are taking to protect their customers from financial cybersecurity threats, and see.