Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Securing data through the compliance lens

As globalization takes shape and government regulations defy borders, the issue of compliance risk remains a top-level business issue. Growing concerns over consumer privacy and data security have prompted a rush of legislation intended at holding corporations more accountable for maintaining and sharing the information they collect about consumers.

MD5 vs SHA1 vs SHA2 vs SHA3 - Compare Hashing Algorithms

As the physical and digital worlds are coming together by the day, the need to protect our privacy and confidentiality is becoming more pivotal. Securing data is essential for everyone, including an organization, a person, or any digital entity. In the world of digital security, hashing and encryption are two important protection structures. Let’s keep encryption for another time and focus on hashing for today.

How to Write a Fuzz Test for JavaScript

JavaScript is widely used in both backend and frontend applications. Crashes that cause downtime or other security issues are very common in nodejs packages. Our goal with Jazzer.js is to make it easy for developers to find such edge cases. In this webinar, Norbert will show you how to secure JavaScript applications using our open-source fuzzer Jazzer.js.

CDN Security - How Does It Help with Website Security?

Cyberattacks have become more sophisticated, and they have the potential to cause severe disruption to service availability and financial loss to businesses. According to Gartner, IT downtime costs businesses $5,600 p/minute on average. For every business with an online presence, being able to serve user requests and deliver content in a secure, reliable, and speedy manner is critical. This is where content delivery networks (CDNs) come in.

Why does preparing for AI attacks need to be your next big agenda?

This blog has been written by an independent guest blogger. Since its advent, the debate over its ethical and unethical use of AI has been ongoing. From movies to discussions and research, the likely adversarial impact AI has had over the world has been a constant cause of concern for every privacy and security-conscious person out there.

Top CMMC Compliance Challenges Experienced Professionals Encounter

With the deadline to comply with CMMC expected in May 2023, many in the Defense Industrial Base are scrambling to understand how to comply, the tools they need to comply, and the cost to comply. It’s a lot to get right, and there’s a lot riding on it—companies will need to comply if they want to do business with the DoD. That’s why we’ve developed a series of blogs, checklists and other assets to help contractors manage the complexity.

Cybersecurity Sessions podcast: My favorite moments from the first ten episodes

Almost a year ago, I took on a new challenge: Start a podcast about cybersecurity – The Cybersecurity Sessions, hosted by Netacea co-founder and CPO Andy Still. To be honest it’s not always easy finding the time to record the podcast between Andy’s more business-critical duties, but it’s a task he’s looked forward to greatly each month since last November. That’s because, like me, Andy is always seeking out new perspectives and information.

Ethical hacking & bug bounty hunting | Cybersecurity Sessions #11 with Jessica Haworth

Cyber-criminals are relentless, and the number of attacks is growing. Businesses are increasingly turning to ethical hackers to find bugs and exploits before attackers do, offering financial incentives for their efforts. As a security researcher, our host Cyril Noel-Tagoe is always on the hunt for new vulnerabilities. He’s joined for this episode by ethical hacking enthusiast and Daily Swig reporter Jessica Haworth, who has a finger firmly on the pulse of the latest bug bounty programs and developments.

What is Digital Onboarding? Why is it transformative for businesses?

Few things are more crucial for internet businesses than the Digital onboarding procedures for user online. You invest a lot of money into getting people to visit your website, and many companies dedicate entire departments to optimizing it so that visitors turn into customers. Nothing could be further from the truth: the onboarding phase is essential not only for your customer journey but also for fraud and risk reasons.